="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a00fc070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3cf6e66818bd2bd28b7f65e972ded1cacb66814cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:16 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 22) 03:48:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000001940)=ANY=[@ANYBLOB="1805eeffffff0000000000004b64ffec850000007d000000850000001445eabc4dd4ffe666555b89acaead0283bb63910484f93f992f4dae41fd88638e2aee7698060d8962e3dbb4b277eae4e46fe518c42b1191b648be316a05cec12940c95cfc5f0fe188382c09ae02ca71ec9b4d79805d1b97c0ea4ca45250d7f2c8f8ee66a1530c18d60f61e2aaa10b979f1035ac4729b2d7718a9422087893356aa8f0930b71843d992ceb823a002606f031bcbe6db4123b971cb3a38eec972880411800546b3cf6be5a7ad5e142587763cc78a13b0750f9fabddf54d5c1f07f00f428419960e72b478181792f3c616eb4760fff562e64dc58862077eb87e1534ce5f4"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x1000000}, 0x20) 03:48:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) (fail_nth: 14) [ 480.901749][T14915] RDX: 0000000000000038 RSI: 0000000020000680 RDI: 0000000000000018 [ 480.909570][T14915] RBP: 00007f18119951d0 R08: 0000000000000000 R09: 0000000000000000 [ 480.917371][T14915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 480.925190][T14915] R13: 00007ffc79a2542f R14: 00007f1811995300 R15: 0000000000022000 [ 480.933001][T14915] 03:48:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x2000000}, 0x20) [ 480.973438][T14937] FAULT_INJECTION: forcing a failure. [ 480.973438][T14937] name failslab, interval 1, probability 0, space 0, times 0 [ 480.992032][T14937] CPU: 0 PID: 14937 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 481.002112][T14937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 481.012006][T14937] Call Trace: [ 481.015132][T14937] [ 481.017909][T14937] dump_stack_lvl+0x151/0x1b7 [ 481.022426][T14937] ? bfq_pos_tree_add_move+0x43e/0x43e [ 481.027715][T14937] ? _raw_spin_lock+0xa3/0x1b0 [ 481.032317][T14937] ? dup_fd+0x51f/0xa40 [ 481.036309][T14937] dump_stack+0x15/0x17 [ 481.040300][T14937] should_fail+0x3c0/0x510 [ 481.044554][T14937] __should_failslab+0x9f/0xe0 [ 481.049153][T14937] should_failslab+0x9/0x20 [ 481.053493][T14937] kmem_cache_alloc+0x4f/0x2f0 [ 481.058087][T14937] ? copy_fs_struct+0x4e/0x230 [ 481.062690][T14937] copy_fs_struct+0x4e/0x230 [ 481.067115][T14937] copy_fs+0x72/0x140 [ 481.070935][T14937] copy_process+0x1214/0x3250 [ 481.075447][T14937] ? proc_fail_nth_write+0x213/0x290 [ 481.080567][T14937] ? proc_fail_nth_read+0x220/0x220 [ 481.085603][T14937] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 481.090547][T14937] ? vfs_write+0x9af/0x1050 [ 481.094887][T14937] ? vmacache_update+0xb7/0x120 [ 481.099580][T14937] kernel_clone+0x22d/0x990 [ 481.103917][T14937] ? file_end_write+0x1b0/0x1b0 [ 481.108602][T14937] ? __kasan_check_write+0x14/0x20 [ 481.113551][T14937] ? create_io_thread+0x1e0/0x1e0 [ 481.118409][T14937] ? __mutex_lock_slowpath+0x10/0x10 [ 481.123530][T14937] __x64_sys_clone+0x289/0x310 [ 481.128131][T14937] ? __do_sys_vfork+0x130/0x130 [ 481.132817][T14937] ? debug_smp_processor_id+0x17/0x20 [ 481.138023][T14937] do_syscall_64+0x44/0xd0 [ 481.142276][T14937] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 481.148005][T14937] RIP: 0033:0x7f8ab3ee50d9 [ 481.152259][T14937] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 03:48:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x8000000}, 0x20) 03:48:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x9000000}, 0x20) 03:48:16 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 23) [ 481.171698][T14937] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 481.179942][T14937] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 481.187756][T14937] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 481.195567][T14937] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 481.203383][T14937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 481.212058][T14937] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 481.219875][T14937] 03:48:16 executing program 4: syz_clone(0xc0800400, 0x0, 0x20200, 0x0, 0x0, 0x0) 03:48:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x10000000}, 0x20) [ 481.274741][T14957] FAULT_INJECTION: forcing a failure. [ 481.274741][T14957] name failslab, interval 1, probability 0, space 0, times 0 [ 481.328206][T14957] CPU: 0 PID: 14957 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 481.338289][T14957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 481.348175][T14957] Call Trace: [ 481.351388][T14957] [ 481.354171][T14957] dump_stack_lvl+0x151/0x1b7 [ 481.358682][T14957] ? bfq_pos_tree_add_move+0x43e/0x43e [ 481.363974][T14957] dump_stack+0x15/0x17 [ 481.367963][T14957] should_fail+0x3c0/0x510 [ 481.372217][T14957] __should_failslab+0x9f/0xe0 [ 481.376816][T14957] should_failslab+0x9/0x20 [ 481.381159][T14957] kmem_cache_alloc+0x4f/0x2f0 [ 481.385764][T14957] ? anon_vma_fork+0x1b9/0x4f0 [ 481.390357][T14957] anon_vma_fork+0x1b9/0x4f0 [ 481.394786][T14957] dup_mmap+0x750/0xea0 [ 481.398778][T14957] ? __delayed_free_task+0x20/0x20 [ 481.403725][T14957] ? mm_init+0x807/0x960 [ 481.407804][T14957] dup_mm+0x91/0x330 [ 481.411538][T14957] copy_mm+0x108/0x1b0 [ 481.415441][T14957] copy_process+0x1295/0x3250 [ 481.419953][T14957] ? proc_fail_nth_write+0x213/0x290 [ 481.425081][T14957] ? proc_fail_nth_read+0x220/0x220 [ 481.430116][T14957] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 481.435055][T14957] ? vfs_write+0x9af/0x1050 [ 481.439392][T14957] ? vmacache_update+0xb7/0x120 [ 481.444082][T14957] kernel_clone+0x22d/0x990 [ 481.448422][T14957] ? file_end_write+0x1b0/0x1b0 [ 481.453107][T14957] ? __kasan_check_write+0x14/0x20 [ 481.458056][T14957] ? create_io_thread+0x1e0/0x1e0 [ 481.462917][T14957] ? __mutex_lock_slowpath+0x10/0x10 [ 481.468039][T14957] __x64_sys_clone+0x289/0x310 [ 481.472638][T14957] ? __do_sys_vfork+0x130/0x130 [ 481.477324][T14957] ? debug_smp_processor_id+0x17/0x20 [ 481.482532][T14957] do_syscall_64+0x44/0xd0 [ 481.486785][T14957] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 481.492513][T14957] RIP: 0033:0x7f8ab3ee50d9 [ 481.496764][T14957] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 481.516211][T14957] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:48:17 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a00fc070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3cf6e66818bd2bd28b7f65e972ded1cacb66814cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="26a42a2988f7978779f34f28f078668735ed389b2853a9df48f7b8cf9030211d1e617be55e9e5d3e7fe4e444da30aaef04bb588bfbca238c0b606400f81ff4909d2d3e5139f8f3ddac15b947dd3c9b1fc1f508c22f27099e425acd3ab2cf15b08a5b8dde5ff2c4f57fd493117663d5ebd47bd528a1d2f038d5e56db8f8d8"], &(0x7f0000000540)='GPL\x00', 0x0, 0x12, &(0x7f0000000000)=""/18, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2]}, 0x80) 03:48:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x40000000}, 0x20) 03:48:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x2, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:17 executing program 4: syz_clone(0xc0800400, 0x0, 0x80000, 0x0, 0x0, 0x0) 03:48:17 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 24) 03:48:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x9c2000a0}, 0x20) [ 481.524452][T14957] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 481.532265][T14957] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 481.540076][T14957] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 481.547894][T14957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 481.555701][T14957] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 481.563521][T14957] 03:48:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="26a42a2988f7978779f34f28f078668735ed389b2853a9df48f7b8cf9030211d1e617be55e9e5d3e7fe4e444da30aaef04bb588bfbca238c0b606400f81ff4909d2d3e5139f8f3ddac15b947dd3c9b1fc1f508c22f27099e425acd3ab2cf15b08a5b8dde5ff2c4f57fd493117663d5ebd47bd528a1d2f038d5e56db8f8d8"], &(0x7f0000000540)='GPL\x00', 0x0, 0x12, &(0x7f0000000000)=""/18, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="26a42a2988f7978779f34f28f078668735ed389b2853a9df48f7b8cf9030211d1e617be55e9e5d3e7fe4e444da30aaef04bb588bfbca238c0b606400f81ff4909d2d3e5139f8f3ddac15b947dd3c9b1fc1f508c22f27099e425acd3ab2cf15b08a5b8dde5ff2c4f57fd493117663d5ebd47bd528a1d2f038d5e56db8f8d8"], &(0x7f0000000540)='GPL\x00', 0x0, 0x12, &(0x7f0000000000)=""/18, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2]}, 0x80) (async) 03:48:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x3, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0xa000209c}, 0x20) [ 481.663204][T14978] FAULT_INJECTION: forcing a failure. [ 481.663204][T14978] name failslab, interval 1, probability 0, space 0, times 0 [ 481.692677][T14978] CPU: 1 PID: 14978 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 481.702756][T14978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 03:48:17 executing program 4: syz_clone(0xc0800400, 0x0, 0x100000, 0x0, 0x0, 0x0) [ 481.712736][T14978] Call Trace: [ 481.715864][T14978] [ 481.718646][T14978] dump_stack_lvl+0x151/0x1b7 [ 481.723153][T14978] ? bfq_pos_tree_add_move+0x43e/0x43e [ 481.728447][T14978] dump_stack+0x15/0x17 [ 481.732443][T14978] should_fail+0x3c0/0x510 [ 481.736695][T14978] __should_failslab+0x9f/0xe0 [ 481.741298][T14978] should_failslab+0x9/0x20 [ 481.745636][T14978] kmem_cache_alloc+0x4f/0x2f0 [ 481.750232][T14978] ? copy_signal+0x55/0x610 [ 481.754603][T14978] copy_signal+0x55/0x610 [ 481.758738][T14978] copy_process+0x126a/0x3250 [ 481.763255][T14978] ? proc_fail_nth_write+0x213/0x290 [ 481.768366][T14978] ? proc_fail_nth_read+0x220/0x220 [ 481.773400][T14978] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 481.778348][T14978] ? vfs_write+0x9af/0x1050 [ 481.782686][T14978] ? vmacache_update+0xb7/0x120 [ 481.787374][T14978] kernel_clone+0x22d/0x990 [ 481.791715][T14978] ? file_end_write+0x1b0/0x1b0 [ 481.796405][T14978] ? __kasan_check_write+0x14/0x20 [ 481.801346][T14978] ? create_io_thread+0x1e0/0x1e0 [ 481.806209][T14978] ? __mutex_lock_slowpath+0x10/0x10 [ 481.811328][T14978] __x64_sys_clone+0x289/0x310 [ 481.815932][T14978] ? __do_sys_vfork+0x130/0x130 [ 481.820616][T14978] ? debug_smp_processor_id+0x17/0x20 [ 481.825823][T14978] do_syscall_64+0x44/0xd0 [ 481.830077][T14978] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 481.835807][T14978] RIP: 0033:0x7f8ab3ee50d9 [ 481.840059][T14978] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 03:48:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x4, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) [ 481.859525][T14978] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 481.867743][T14978] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 481.875903][T14978] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 481.883721][T14978] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 481.891531][T14978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 481.899350][T14978] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 481.907151][T14978] 03:48:17 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a00fc070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3cf6e66818bd2bd28b7f65e972ded1cacb66814cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a00fc070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3cf6e66818bd2bd28b7f65e972ded1cacb66814cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 03:48:17 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 25) 03:48:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="26a42a2988f7978779f34f28f078668735ed389b2853a9df48f7b8cf9030211d1e617be55e9e5d3e7fe4e444da30aaef04bb588bfbca238c0b606400f81ff4909d2d3e5139f8f3ddac15b947dd3c9b1fc1f508c22f27099e425acd3ab2cf15b08a5b8dde5ff2c4f57fd493117663d5ebd47bd528a1d2f038d5e56db8f8d8"], &(0x7f0000000540)='GPL\x00', 0x0, 0x12, &(0x7f0000000000)=""/18, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2]}, 0x80) 03:48:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x5, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0xa0024000}, 0x20) 03:48:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0xffff0200}, 0x20) 03:48:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x6, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:17 executing program 4: syz_clone(0xc0800400, 0x0, 0x101000, 0x0, 0x0, 0x0) [ 482.075243][T15019] FAULT_INJECTION: forcing a failure. [ 482.075243][T15019] name failslab, interval 1, probability 0, space 0, times 0 [ 482.095822][T15019] CPU: 0 PID: 15019 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 482.105909][T15019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 482.115791][T15019] Call Trace: [ 482.118923][T15019] [ 482.121689][T15019] dump_stack_lvl+0x151/0x1b7 [ 482.126202][T15019] ? bfq_pos_tree_add_move+0x43e/0x43e [ 482.131504][T15019] dump_stack+0x15/0x17 [ 482.135495][T15019] should_fail+0x3c0/0x510 [ 482.139746][T15019] __should_failslab+0x9f/0xe0 [ 482.144347][T15019] should_failslab+0x9/0x20 [ 482.148686][T15019] kmem_cache_alloc+0x4f/0x2f0 [ 482.153282][T15019] ? dup_mm+0x29/0x330 [ 482.157196][T15019] dup_mm+0x29/0x330 [ 482.160929][T15019] copy_mm+0x108/0x1b0 [ 482.164832][T15019] copy_process+0x1295/0x3250 [ 482.169343][T15019] ? proc_fail_nth_write+0x213/0x290 [ 482.174462][T15019] ? proc_fail_nth_read+0x220/0x220 [ 482.179499][T15019] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 482.184461][T15019] ? vfs_write+0x9af/0x1050 [ 482.188781][T15019] ? vmacache_update+0xb7/0x120 [ 482.193498][T15019] kernel_clone+0x22d/0x990 [ 482.197808][T15019] ? file_end_write+0x1b0/0x1b0 [ 482.202497][T15019] ? __kasan_check_write+0x14/0x20 [ 482.207443][T15019] ? create_io_thread+0x1e0/0x1e0 [ 482.212315][T15019] ? __mutex_lock_slowpath+0x10/0x10 [ 482.217431][T15019] __x64_sys_clone+0x289/0x310 [ 482.222030][T15019] ? __do_sys_vfork+0x130/0x130 [ 482.226713][T15019] ? debug_smp_processor_id+0x17/0x20 [ 482.231918][T15019] do_syscall_64+0x44/0xd0 [ 482.236171][T15019] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 482.241901][T15019] RIP: 0033:0x7f8ab3ee50d9 [ 482.246152][T15019] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 482.265595][T15019] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:48:17 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805bb8992440000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r4 = gettid() perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x20, 0x3, 0x1, 0x6, 0x0, 0x3ff, 0x0, 0xf, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x0, 0x0, 0x7f, 0x7, 0xfff, 0xfffffff9, 0x5, 0x0, 0xbfb, 0x0, 0x80000000}, r4, 0x9, r0, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:17 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 26) 03:48:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x2ffff00000000}, 0x20) 03:48:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x7, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:17 executing program 2: r0 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") syz_open_procfs$namespace(r0, &(0x7f0000000200)='ns/time\x00') perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x9, 0xd4, 0x1, 0x3, 0x0, 0x5, 0x41801, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x2, 0x1ff, 0x8, 0x0, 0x4, 0x400, 0x1, 0x0, 0xffffffff, 0x0, 0x5a00000000000}, r0, 0x0, 0xffffffffffffffff, 0xa) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180300000002ffff0000009500"/25], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 482.273929][T15019] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 482.281825][T15019] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 482.289635][T15019] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 482.297457][T15019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 482.305269][T15019] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 482.313075][T15019] 03:48:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x8, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x4002a0ffffffff}, 0x20) 03:48:17 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805bb8992440000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) r4 = gettid() perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x20, 0x3, 0x1, 0x6, 0x0, 0x3ff, 0x0, 0xf, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x0, 0x0, 0x7f, 0x7, 0xfff, 0xfffffff9, 0x5, 0x0, 0xbfb, 0x0, 0x80000000}, r4, 0x9, r0, 0x1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x9, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x100000000000000}, 0x20) [ 482.395977][T15052] FAULT_INJECTION: forcing a failure. [ 482.395977][T15052] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:48:17 executing program 4: syz_clone(0xc0800400, 0x0, 0x4002a0, 0x0, 0x0, 0x0) [ 482.439956][T15052] CPU: 0 PID: 15052 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 482.450045][T15052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 482.459928][T15052] Call Trace: [ 482.463047][T15052] [ 482.465826][T15052] dump_stack_lvl+0x151/0x1b7 [ 482.470345][T15052] ? bfq_pos_tree_add_move+0x43e/0x43e [ 482.475643][T15052] dump_stack+0x15/0x17 [ 482.479627][T15052] should_fail+0x3c0/0x510 [ 482.483881][T15052] should_fail_alloc_page+0x58/0x70 [ 482.488910][T15052] __alloc_pages+0x1de/0x7c0 [ 482.493343][T15052] ? __count_vm_events+0x30/0x30 [ 482.498112][T15052] ? dup_mm+0x91/0x330 [ 482.502016][T15052] ? copy_mm+0x108/0x1b0 [ 482.506098][T15052] ? copy_process+0x1295/0x3250 [ 482.510791][T15052] ? kernel_clone+0x22d/0x990 [ 482.515295][T15052] ? __x64_sys_clone+0x289/0x310 [ 482.520073][T15052] pte_alloc_one+0x73/0x1b0 [ 482.524429][T15052] ? pfn_modify_allowed+0x2e0/0x2e0 [ 482.529531][T15052] ? __kasan_check_write+0x14/0x20 [ 482.534479][T15052] ? __set_page_owner+0x2ee/0x310 [ 482.539343][T15052] __pte_alloc+0x86/0x350 [ 482.543507][T15052] ? post_alloc_hook+0x1ab/0x1b0 [ 482.548280][T15052] ? free_pgtables+0x210/0x210 [ 482.552877][T15052] ? get_page_from_freelist+0x38b/0x400 [ 482.558260][T15052] copy_pte_range+0x1b1f/0x20b0 [ 482.562953][T15052] ? __kunmap_atomic+0x80/0x80 [ 482.567548][T15052] ? __pud_alloc+0x260/0x260 [ 482.571972][T15052] ? __pud_alloc+0x218/0x260 [ 482.576396][T15052] ? do_handle_mm_fault+0x2370/0x2370 [ 482.581612][T15052] copy_page_range+0xc1e/0x1090 [ 482.586298][T15052] ? pfn_valid+0x1e0/0x1e0 [ 482.590556][T15052] dup_mmap+0x99f/0xea0 [ 482.594547][T15052] ? __delayed_free_task+0x20/0x20 [ 482.599488][T15052] ? mm_init+0x807/0x960 [ 482.603568][T15052] dup_mm+0x91/0x330 [ 482.607302][T15052] copy_mm+0x108/0x1b0 [ 482.611209][T15052] copy_process+0x1295/0x3250 [ 482.615722][T15052] ? proc_fail_nth_write+0x213/0x290 [ 482.620839][T15052] ? proc_fail_nth_read+0x220/0x220 [ 482.625873][T15052] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 482.630820][T15052] ? vfs_write+0x9af/0x1050 [ 482.635159][T15052] ? vmacache_update+0xb7/0x120 [ 482.639848][T15052] kernel_clone+0x22d/0x990 [ 482.644187][T15052] ? file_end_write+0x1b0/0x1b0 [ 482.648873][T15052] ? __kasan_check_write+0x14/0x20 [ 482.653823][T15052] ? create_io_thread+0x1e0/0x1e0 [ 482.658679][T15052] ? __mutex_lock_slowpath+0x10/0x10 [ 482.663811][T15052] __x64_sys_clone+0x289/0x310 [ 482.668404][T15052] ? __do_sys_vfork+0x130/0x130 [ 482.673088][T15052] ? debug_smp_processor_id+0x17/0x20 [ 482.678298][T15052] do_syscall_64+0x44/0xd0 [ 482.682550][T15052] entry_SYSCALL_64_after_hwframe+0x61/0xcb 03:48:18 executing program 2: r0 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") syz_open_procfs$namespace(r0, &(0x7f0000000200)='ns/time\x00') perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x9, 0xd4, 0x1, 0x3, 0x0, 0x5, 0x41801, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x2, 0x1ff, 0x8, 0x0, 0x4, 0x400, 0x1, 0x0, 0xffffffff, 0x0, 0x5a00000000000}, r0, 0x0, 0xffffffffffffffff, 0xa) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180300000002ffff0000009500"/25], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 482.688285][T15052] RIP: 0033:0x7f8ab3ee50d9 [ 482.692529][T15052] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 482.711976][T15052] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 482.720220][T15052] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 482.728028][T15052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 03:48:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x200000000000000}, 0x20) 03:48:18 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 27) 03:48:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805bb8992440000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r4 = gettid() perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x20, 0x3, 0x1, 0x6, 0x0, 0x3ff, 0x0, 0xf, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x0, 0x0, 0x7f, 0x7, 0xfff, 0xfffffff9, 0x5, 0x0, 0xbfb, 0x0, 0x80000000}, r4, 0x9, r0, 0x1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 482.735841][T15052] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 482.743653][T15052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 482.751462][T15052] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 482.759390][T15052] 03:48:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0xa, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000001940)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ff000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead07002273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7000000000000003a52758dff7486d1607e896abdcac191f768f0dd4b467f211c12c0956f1fe8af916ac3b3e96bc8f18c6a0aae0df864e53cd875f5d7fb008d5296e0ee165c8ebd3394dc80917923faa835d1b733ad12c615a7e9a9e8"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r2}, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002d00)={&(0x7f0000002cc0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002d80)={0x18, 0x4, &(0x7f0000000500)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0xb, 0x0, 0xfffffffffffffffe, 0x2}, @generic={0xff, 0x1, 0x3, 0x7, 0x3f}], &(0x7f00000006c0)='syzkaller\x00', 0x9c, 0x1000, &(0x7f0000001cc0)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000001c00)={0x2, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002d40)=[r6]}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r7, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r8, 0x0, r7, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4004662b, &(0x7f00000005c0)=0x1) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r10, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r10, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r7, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r10]}, 0x80) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x221c, 0x7, 0x4, 0x0, r2, 0xcd6b, '\x00', r1, r2, 0x5, 0x4, 0x1, 0x8}, 0x48) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@bloom_filter={0x1e, 0x3, 0x10001, 0xff, 0x2, 0xffffffffffffffff, 0x4, '\x00', r1, r2, 0x5, 0x1, 0x3, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001a40)={0x6, 0x5, &(0x7f0000000000)=@raw=[@exit, @call={0x85, 0x0, 0x0, 0x1f}, @exit, @map_idx={0x18, 0x5, 0x5, 0x0, 0x3}], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x9, r4, 0x8, &(0x7f0000000240)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x10, 0x7f, 0x9}, 0x10, 0x0, r3, 0x0, &(0x7f0000000440)=[r2, r5, r2, r2, r2, r11, r12]}, 0x80) 03:48:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x800000000000000}, 0x20) 03:48:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0xb, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x900000000000000}, 0x20) 03:48:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0xc, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) [ 482.856337][T15094] FAULT_INJECTION: forcing a failure. [ 482.856337][T15094] name failslab, interval 1, probability 0, space 0, times 0 [ 482.886946][T15094] CPU: 0 PID: 15094 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 03:48:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000001940)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ff000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead07002273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7000000000000003a52758dff7486d1607e896abdcac191f768f0dd4b467f211c12c0956f1fe8af916ac3b3e96bc8f18c6a0aae0df864e53cd875f5d7fb008d5296e0ee165c8ebd3394dc80917923faa835d1b733ad12c615a7e9a9e8"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r2}, 0x8) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002d00)={&(0x7f0000002cc0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002d80)={0x18, 0x4, &(0x7f0000000500)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0xb, 0x0, 0xfffffffffffffffe, 0x2}, @generic={0xff, 0x1, 0x3, 0x7, 0x3f}], &(0x7f00000006c0)='syzkaller\x00', 0x9c, 0x1000, &(0x7f0000001cc0)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000001c00)={0x2, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002d40)=[r6]}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r7, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r8, 0x0, r7, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r10, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r10, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r7, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r10]}, 0x80) (async, rerun: 64) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x221c, 0x7, 0x4, 0x0, r2, 0xcd6b, '\x00', r1, r2, 0x5, 0x4, 0x1, 0x8}, 0x48) (rerun: 64) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@bloom_filter={0x1e, 0x3, 0x10001, 0xff, 0x2, 0xffffffffffffffff, 0x4, '\x00', r1, r2, 0x5, 0x1, 0x3, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001a40)={0x6, 0x5, &(0x7f0000000000)=@raw=[@exit, @call={0x85, 0x0, 0x0, 0x1f}, @exit, @map_idx={0x18, 0x5, 0x5, 0x0, 0x3}], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x9, r4, 0x8, &(0x7f0000000240)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x10, 0x7f, 0x9}, 0x10, 0x0, r3, 0x0, &(0x7f0000000440)=[r2, r5, r2, r2, r2, r11, r12]}, 0x80) [ 482.897108][T15094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 482.907090][T15094] Call Trace: [ 482.910215][T15094] [ 482.912992][T15094] dump_stack_lvl+0x151/0x1b7 [ 482.917504][T15094] ? bfq_pos_tree_add_move+0x43e/0x43e [ 482.923149][T15094] dump_stack+0x15/0x17 [ 482.927140][T15094] should_fail+0x3c0/0x510 [ 482.931480][T15094] __should_failslab+0x9f/0xe0 [ 482.936082][T15094] should_failslab+0x9/0x20 [ 482.940421][T15094] kmem_cache_alloc+0x4f/0x2f0 [ 482.945022][T15094] ? vm_area_dup+0x26/0x1d0 [ 482.949359][T15094] vm_area_dup+0x26/0x1d0 [ 482.953522][T15094] dup_mmap+0x6b8/0xea0 [ 482.957520][T15094] ? __delayed_free_task+0x20/0x20 [ 482.962637][T15094] ? mm_init+0x807/0x960 [ 482.966716][T15094] dup_mm+0x91/0x330 [ 482.970622][T15094] copy_mm+0x108/0x1b0 [ 482.974531][T15094] copy_process+0x1295/0x3250 [ 482.979044][T15094] ? proc_fail_nth_write+0x213/0x290 [ 482.984163][T15094] ? proc_fail_nth_read+0x220/0x220 [ 482.989197][T15094] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 482.994143][T15094] ? vfs_write+0x9af/0x1050 [ 482.998481][T15094] ? vmacache_update+0xb7/0x120 [ 483.003171][T15094] kernel_clone+0x22d/0x990 [ 483.007511][T15094] ? file_end_write+0x1b0/0x1b0 [ 483.012195][T15094] ? __kasan_check_write+0x14/0x20 [ 483.017145][T15094] ? create_io_thread+0x1e0/0x1e0 [ 483.022013][T15094] ? __mutex_lock_slowpath+0x10/0x10 [ 483.027126][T15094] __x64_sys_clone+0x289/0x310 [ 483.031725][T15094] ? __do_sys_vfork+0x130/0x130 [ 483.036416][T15094] ? debug_smp_processor_id+0x17/0x20 [ 483.041623][T15094] do_syscall_64+0x44/0xd0 [ 483.045873][T15094] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 483.051600][T15094] RIP: 0033:0x7f8ab3ee50d9 [ 483.055955][T15094] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 483.075391][T15094] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 483.083636][T15094] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 483.091449][T15094] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 483.099264][T15094] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 03:48:18 executing program 4: syz_clone(0xc0800400, 0x0, 0x900000, 0x0, 0x0, 0x0) 03:48:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000001940)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ff000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead07002273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7000000000000003a52758dff7486d1607e896abdcac191f768f0dd4b467f211c12c0956f1fe8af916ac3b3e96bc8f18c6a0aae0df864e53cd875f5d7fb008d5296e0ee165c8ebd3394dc80917923faa835d1b733ad12c615a7e9a9e8"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r2}, 0x8) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002d00)={&(0x7f0000002cc0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002d80)={0x18, 0x4, &(0x7f0000000500)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0xb, 0x0, 0xfffffffffffffffe, 0x2}, @generic={0xff, 0x1, 0x3, 0x7, 0x3f}], &(0x7f00000006c0)='syzkaller\x00', 0x9c, 0x1000, &(0x7f0000001cc0)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000001c00)={0x2, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002d40)=[r6]}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r7, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r8, 0x0, r7, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r10, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r10, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r7, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r10]}, 0x80) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x221c, 0x7, 0x4, 0x0, r2, 0xcd6b, '\x00', r1, r2, 0x5, 0x4, 0x1, 0x8}, 0x48) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@bloom_filter={0x1e, 0x3, 0x10001, 0xff, 0x2, 0xffffffffffffffff, 0x4, '\x00', r1, r2, 0x5, 0x1, 0x3, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001a40)={0x6, 0x5, &(0x7f0000000000)=@raw=[@exit, @call={0x85, 0x0, 0x0, 0x1f}, @exit, @map_idx={0x18, 0x5, 0x5, 0x0, 0x3}], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x9, r4, 0x8, &(0x7f0000000240)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x10, 0x7f, 0x9}, 0x10, 0x0, r3, 0x0, &(0x7f0000000440)=[r2, r5, r2, r2, r2, r11, r12]}, 0x80) 03:48:18 executing program 2: r0 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") syz_open_procfs$namespace(r0, &(0x7f0000000200)='ns/time\x00') (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x9, 0xd4, 0x1, 0x3, 0x0, 0x5, 0x41801, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x2, 0x1ff, 0x8, 0x0, 0x4, 0x400, 0x1, 0x0, 0xffffffff, 0x0, 0x5a00000000000}, r0, 0x0, 0xffffffffffffffff, 0xa) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180300000002ffff0000009500"/25], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:18 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 28) 03:48:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x1000000000000000}, 0x20) 03:48:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0xd, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) [ 483.107071][T15094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 483.114882][T15094] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 483.122701][T15094] 03:48:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x4000000000000000}, 0x20) 03:48:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x109, 0x3}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0xe, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) [ 483.163153][T15131] FAULT_INJECTION: forcing a failure. [ 483.163153][T15131] name failslab, interval 1, probability 0, space 0, times 0 [ 483.192220][T15131] CPU: 0 PID: 15131 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 483.202292][T15131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 483.212186][T15131] Call Trace: [ 483.215372][T15131] [ 483.218088][T15131] dump_stack_lvl+0x151/0x1b7 [ 483.222600][T15131] ? bfq_pos_tree_add_move+0x43e/0x43e [ 483.227900][T15131] dump_stack+0x15/0x17 [ 483.231888][T15131] should_fail+0x3c0/0x510 [ 483.236141][T15131] __should_failslab+0x9f/0xe0 [ 483.240742][T15131] should_failslab+0x9/0x20 [ 483.245082][T15131] kmem_cache_alloc+0x4f/0x2f0 [ 483.249684][T15131] ? vm_area_dup+0x26/0x1d0 [ 483.254020][T15131] ? __kasan_check_read+0x11/0x20 [ 483.258884][T15131] vm_area_dup+0x26/0x1d0 [ 483.263046][T15131] dup_mmap+0x6b8/0xea0 [ 483.267045][T15131] ? __delayed_free_task+0x20/0x20 [ 483.271987][T15131] ? mm_init+0x807/0x960 [ 483.276075][T15131] dup_mm+0x91/0x330 [ 483.279803][T15131] copy_mm+0x108/0x1b0 [ 483.283706][T15131] copy_process+0x1295/0x3250 [ 483.288221][T15131] ? proc_fail_nth_write+0x213/0x290 [ 483.293340][T15131] ? proc_fail_nth_read+0x220/0x220 [ 483.298373][T15131] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 483.303320][T15131] ? vfs_write+0x9af/0x1050 [ 483.307659][T15131] ? vmacache_update+0xb7/0x120 [ 483.312356][T15131] kernel_clone+0x22d/0x990 [ 483.316689][T15131] ? file_end_write+0x1b0/0x1b0 [ 483.321375][T15131] ? __kasan_check_write+0x14/0x20 [ 483.326326][T15131] ? create_io_thread+0x1e0/0x1e0 [ 483.331183][T15131] ? __mutex_lock_slowpath+0x10/0x10 [ 483.336305][T15131] __x64_sys_clone+0x289/0x310 [ 483.340903][T15131] ? __do_sys_vfork+0x130/0x130 [ 483.345594][T15131] ? debug_smp_processor_id+0x17/0x20 [ 483.350800][T15131] do_syscall_64+0x44/0xd0 [ 483.355049][T15131] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 483.360784][T15131] RIP: 0033:0x7f8ab3ee50d9 [ 483.365033][T15131] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 483.384475][T15131] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 483.392718][T15131] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 483.400531][T15131] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 03:48:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0x9c2000a0ffffffff}, 0x20) 03:48:18 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 29) 03:48:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0xf, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) [ 483.408341][T15131] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 483.416152][T15131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 483.423965][T15131] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 483.431785][T15131] [ 483.491396][T15150] FAULT_INJECTION: forcing a failure. [ 483.491396][T15150] name failslab, interval 1, probability 0, space 0, times 0 [ 483.532224][T15150] CPU: 0 PID: 15150 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 483.542303][T15150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 483.552196][T15150] Call Trace: [ 483.555319][T15150] [ 483.558097][T15150] dump_stack_lvl+0x151/0x1b7 [ 483.562615][T15150] ? bfq_pos_tree_add_move+0x43e/0x43e [ 483.567906][T15150] ? do_syscall_64+0x44/0xd0 [ 483.572330][T15150] dump_stack+0x15/0x17 [ 483.576321][T15150] should_fail+0x3c0/0x510 [ 483.580582][T15150] __should_failslab+0x9f/0xe0 [ 483.585177][T15150] should_failslab+0x9/0x20 [ 483.589609][T15150] kmem_cache_alloc+0x4f/0x2f0 [ 483.594213][T15150] ? anon_vma_clone+0xa1/0x4f0 [ 483.598897][T15150] anon_vma_clone+0xa1/0x4f0 [ 483.603327][T15150] anon_vma_fork+0x91/0x4f0 [ 483.607752][T15150] ? anon_vma_name+0x4c/0x70 [ 483.612269][T15150] dup_mmap+0x750/0xea0 [ 483.616256][T15150] ? __delayed_free_task+0x20/0x20 [ 483.621210][T15150] ? mm_init+0x807/0x960 [ 483.625289][T15150] dup_mm+0x91/0x330 [ 483.629015][T15150] copy_mm+0x108/0x1b0 [ 483.632923][T15150] copy_process+0x1295/0x3250 [ 483.637436][T15150] ? proc_fail_nth_write+0x213/0x290 [ 483.642560][T15150] ? proc_fail_nth_read+0x220/0x220 [ 483.647589][T15150] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 483.652539][T15150] ? vfs_write+0x9af/0x1050 [ 483.656875][T15150] ? vmacache_update+0xb7/0x120 [ 483.661563][T15150] kernel_clone+0x22d/0x990 [ 483.665903][T15150] ? file_end_write+0x1b0/0x1b0 [ 483.670589][T15150] ? __kasan_check_write+0x14/0x20 [ 483.675549][T15150] ? create_io_thread+0x1e0/0x1e0 [ 483.680399][T15150] ? __mutex_lock_slowpath+0x10/0x10 [ 483.685701][T15150] __x64_sys_clone+0x289/0x310 [ 483.690292][T15150] ? __do_sys_vfork+0x130/0x130 [ 483.694986][T15150] ? debug_smp_processor_id+0x17/0x20 [ 483.700188][T15150] do_syscall_64+0x44/0xd0 [ 483.704439][T15150] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 483.710265][T15150] RIP: 0033:0x7f8ab3ee50d9 [ 483.714520][T15150] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 483.733963][T15150] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 483.742207][T15150] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 483.750019][T15150] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 483.757829][T15150] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 483.765652][T15150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 483.773455][T15150] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 03:48:19 executing program 4: syz_clone(0xc0800400, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0) 03:48:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0006250800100009000000a2c1be9cf32945007b80"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = gettid() r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x40, 0x5, 0x7f, 0xfa, 0x0, 0x469, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x5}, 0x0, 0x3f, 0x8, 0x9, 0x8001, 0x1, 0x9, 0x0, 0x80000001, 0x0, 0x6}, r2, 0x5, r1, 0x1) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x6, 0x1f, 0x80, 0x0, 0x515c, 0x12808, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_config_ext={0x20}, 0x22, 0x7fffffff, 0x200, 0x1, 0xdc, 0x1, 0x0, 0x0, 0x9, 0x0, 0x9c2}, r3, 0x8, r4, 0x3) 03:48:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x109, 0x3}, 0x10}, 0x80) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0xffffffffa000209c}, 0x20) 03:48:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x10, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166, 0xffffffffa0024000}, 0x20) 03:48:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x11, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) [ 483.781268][T15150] 03:48:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x109, 0x3}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x109, 0x3}, 0x10}, 0x80) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x9) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) 03:48:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x120) 03:48:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x12, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:19 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 30) 03:48:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x200020) [ 483.893864][T15182] FAULT_INJECTION: forcing a failure. [ 483.893864][T15182] name failslab, interval 1, probability 0, space 0, times 0 [ 483.942958][T15182] CPU: 1 PID: 15182 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 483.953042][T15182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 483.962945][T15182] Call Trace: [ 483.966060][T15182] [ 483.968836][T15182] dump_stack_lvl+0x151/0x1b7 [ 483.973359][T15182] ? bfq_pos_tree_add_move+0x43e/0x43e [ 483.978666][T15182] dump_stack+0x15/0x17 [ 483.982687][T15182] should_fail+0x3c0/0x510 [ 483.986892][T15182] __should_failslab+0x9f/0xe0 [ 483.991491][T15182] should_failslab+0x9/0x20 [ 483.995828][T15182] kmem_cache_alloc+0x4f/0x2f0 [ 484.000431][T15182] ? vm_area_dup+0x26/0x1d0 [ 484.004772][T15182] vm_area_dup+0x26/0x1d0 [ 484.008935][T15182] dup_mmap+0x6b8/0xea0 [ 484.012932][T15182] ? __delayed_free_task+0x20/0x20 [ 484.017882][T15182] ? mm_init+0x807/0x960 [ 484.021954][T15182] dup_mm+0x91/0x330 [ 484.025686][T15182] copy_mm+0x108/0x1b0 [ 484.029592][T15182] copy_process+0x1295/0x3250 [ 484.034108][T15182] ? proc_fail_nth_write+0x213/0x290 [ 484.039228][T15182] ? proc_fail_nth_read+0x220/0x220 [ 484.044260][T15182] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 484.049213][T15182] ? vfs_write+0x9af/0x1050 [ 484.053546][T15182] ? vmacache_update+0xb7/0x120 [ 484.058234][T15182] kernel_clone+0x22d/0x990 [ 484.062574][T15182] ? file_end_write+0x1b0/0x1b0 [ 484.067257][T15182] ? __kasan_check_write+0x14/0x20 [ 484.072204][T15182] ? create_io_thread+0x1e0/0x1e0 [ 484.077068][T15182] ? __mutex_lock_slowpath+0x10/0x10 [ 484.082189][T15182] __x64_sys_clone+0x289/0x310 [ 484.086789][T15182] ? __do_sys_vfork+0x130/0x130 [ 484.091477][T15182] ? debug_smp_processor_id+0x17/0x20 [ 484.096685][T15182] do_syscall_64+0x44/0xd0 [ 484.100938][T15182] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 484.106666][T15182] RIP: 0033:0x7f8ab3ee50d9 [ 484.110921][T15182] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 484.130362][T15182] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 484.138614][T15182] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 484.146416][T15182] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 484.154228][T15182] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 484.162038][T15182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 484.169849][T15182] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 484.177668][T15182] 03:48:19 executing program 4: syz_clone(0xc0800400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 03:48:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x13, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:19 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001940)=ANY=[@ANYBLOB="185a00000e000014ad5d8b7ba3ad0d000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b0000000000000000008ff7235d47e8921cd797f79567583bb15b875f87e07997ffc8ce886412f2194a2178a9ad5bf4703e3fb1d3ae3357ac079d36329b980e3f76374fbb0bd52d38e0e8697ce125823a245f36a54783b3f742860a16304cbebb706a4a98c19d4f63d11357195bbdc2031d99f28c042ef12ede479b08ffda942fb026c3737bea784874e43ccc6e4e5904ed83e6fdd7ed7344e951f0b2aba5bbae2aa947633b04417b8fca67bad37ab4740ef5e09059e6befb97ad"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x300020) 03:48:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0006250800100009000000a2c1be9cf32945007b80"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = gettid() (async) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x40, 0x5, 0x7f, 0xfa, 0x0, 0x469, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x5}, 0x0, 0x3f, 0x8, 0x9, 0x8001, 0x1, 0x9, 0x0, 0x80000001, 0x0, 0x6}, r2, 0x5, r1, 0x1) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x6, 0x1f, 0x80, 0x0, 0x515c, 0x12808, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_config_ext={0x20}, 0x22, 0x7fffffff, 0x200, 0x1, 0xdc, 0x1, 0x0, 0x0, 0x9, 0x0, 0x9c2}, r3, 0x8, r4, 0x3) 03:48:19 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 31) 03:48:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x400020) 03:48:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x500020) 03:48:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x600020) 03:48:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x14, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:19 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001940)=ANY=[@ANYBLOB="185a00000e000014ad5d8b7ba3ad0d000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b0000000000000000008ff7235d47e8921cd797f79567583bb15b875f87e07997ffc8ce886412f2194a2178a9ad5bf4703e3fb1d3ae3357ac079d36329b980e3f76374fbb0bd52d38e0e8697ce125823a245f36a54783b3f742860a16304cbebb706a4a98c19d4f63d11357195bbdc2031d99f28c042ef12ede479b08ffda942fb026c3737bea784874e43ccc6e4e5904ed83e6fdd7ed7344e951f0b2aba5bbae2aa947633b04417b8fca67bad37ab4740ef5e09059e6befb97ad"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001940)=ANY=[@ANYBLOB="185a00000e000014ad5d8b7ba3ad0d000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b0000000000000000008ff7235d47e8921cd797f79567583bb15b875f87e07997ffc8ce886412f2194a2178a9ad5bf4703e3fb1d3ae3357ac079d36329b980e3f76374fbb0bd52d38e0e8697ce125823a245f36a54783b3f742860a16304cbebb706a4a98c19d4f63d11357195bbdc2031d99f28c042ef12ede479b08ffda942fb026c3737bea784874e43ccc6e4e5904ed83e6fdd7ed7344e951f0b2aba5bbae2aa947633b04417b8fca67bad37ab4740ef5e09059e6befb97ad"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) [ 484.423351][T15212] FAULT_INJECTION: forcing a failure. [ 484.423351][T15212] name failslab, interval 1, probability 0, space 0, times 0 [ 484.482324][T15212] CPU: 0 PID: 15212 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 484.492407][T15212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 484.502333][T15212] Call Trace: [ 484.505714][T15212] [ 484.508492][T15212] dump_stack_lvl+0x151/0x1b7 [ 484.513008][T15212] ? bfq_pos_tree_add_move+0x43e/0x43e [ 484.518304][T15212] dump_stack+0x15/0x17 [ 484.522289][T15212] should_fail+0x3c0/0x510 [ 484.526553][T15212] __should_failslab+0x9f/0xe0 [ 484.531149][T15212] should_failslab+0x9/0x20 [ 484.535572][T15212] kmem_cache_alloc+0x4f/0x2f0 [ 484.540172][T15212] ? vm_area_dup+0x26/0x1d0 [ 484.544514][T15212] vm_area_dup+0x26/0x1d0 [ 484.548678][T15212] dup_mmap+0x6b8/0xea0 [ 484.552762][T15212] ? __delayed_free_task+0x20/0x20 [ 484.557703][T15212] ? mm_init+0x807/0x960 [ 484.561785][T15212] dup_mm+0x91/0x330 [ 484.565514][T15212] copy_mm+0x108/0x1b0 [ 484.569507][T15212] copy_process+0x1295/0x3250 [ 484.574024][T15212] ? proc_fail_nth_write+0x213/0x290 [ 484.579142][T15212] ? proc_fail_nth_read+0x220/0x220 [ 484.584179][T15212] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 484.589129][T15212] ? vfs_write+0x9af/0x1050 [ 484.593467][T15212] ? vmacache_update+0xb7/0x120 [ 484.598253][T15212] kernel_clone+0x22d/0x990 [ 484.602589][T15212] ? file_end_write+0x1b0/0x1b0 [ 484.607276][T15212] ? __kasan_check_write+0x14/0x20 [ 484.612225][T15212] ? create_io_thread+0x1e0/0x1e0 [ 484.617081][T15212] ? __mutex_lock_slowpath+0x10/0x10 [ 484.622202][T15212] __x64_sys_clone+0x289/0x310 [ 484.626803][T15212] ? __do_sys_vfork+0x130/0x130 [ 484.631495][T15212] ? debug_smp_processor_id+0x17/0x20 [ 484.636699][T15212] do_syscall_64+0x44/0xd0 [ 484.640950][T15212] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 484.646679][T15212] RIP: 0033:0x7f8ab3ee50d9 [ 484.650933][T15212] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 484.670378][T15212] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:48:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x15, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) [ 484.678619][T15212] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 484.686441][T15212] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 484.694245][T15212] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 484.702054][T15212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 484.709864][T15212] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 484.717682][T15212] 03:48:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0006250800100009000000a2c1be9cf32945007b80"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = gettid() (async) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x40, 0x5, 0x7f, 0xfa, 0x0, 0x469, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x5}, 0x0, 0x3f, 0x8, 0x9, 0x8001, 0x1, 0x9, 0x0, 0x80000001, 0x0, 0x6}, r2, 0x5, r1, 0x1) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x6, 0x1f, 0x80, 0x0, 0x515c, 0x12808, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_config_ext={0x20}, 0x22, 0x7fffffff, 0x200, 0x1, 0xdc, 0x1, 0x0, 0x0, 0x9, 0x0, 0x9c2}, r3, 0x8, r4, 0x3) 03:48:20 executing program 4: syz_clone(0xc0800400, 0x0, 0x2000000, 0x0, 0x0, 0x0) 03:48:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x700020) 03:48:20 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 32) 03:48:20 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 32) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001940)=ANY=[@ANYBLOB="185a00000e000014ad5d8b7ba3ad0d000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b0000000000000000008ff7235d47e8921cd797f79567583bb15b875f87e07997ffc8ce886412f2194a2178a9ad5bf4703e3fb1d3ae3357ac079d36329b980e3f76374fbb0bd52d38e0e8697ce125823a245f36a54783b3f742860a16304cbebb706a4a98c19d4f63d11357195bbdc2031d99f28c042ef12ede479b08ffda942fb026c3737bea784874e43ccc6e4e5904ed83e6fdd7ed7344e951f0b2aba5bbae2aa947633b04417b8fca67bad37ab4740ef5e09059e6befb97ad"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x16, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x800020) 03:48:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x17, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x900020) 03:48:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=@bloom_filter={0x1e, 0x10000, 0x0, 0x101, 0x840, r1, 0x1, '\x00', 0x0, r1, 0x1, 0x0, 0x3, 0xd}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYRES16=0x0], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x41000, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x47e4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c00)={0xffffffffffffffff, 0x4f2, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001d00)={0x11, 0x1, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x2, 0xa, 0x2, 0x8, 0x8}], &(0x7f0000000480)='syzkaller\x00', 0x7, 0x1000, &(0x7f00000009c0)=""/4096, 0x40f00, 0x10, '\x00', 0x0, 0x8, r1, 0x8, &(0x7f0000000880)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0xe, 0xfff, 0x20}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000001cc0)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, r6, r8]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x12, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r12]}, 0x80) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xe, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5a2538c9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xfffffffe}, @map_val={0x18, 0xa, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x8e92}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x26}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x84, &(0x7f0000000300)=""/132, 0x41100, 0x2, '\x00', 0x0, 0x0, r13, 0x8, &(0x7f0000000180)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x3, 0x8, 0x9}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 484.892819][T15251] FAULT_INJECTION: forcing a failure. [ 484.892819][T15251] name failslab, interval 1, probability 0, space 0, times 0 [ 484.954457][T15251] CPU: 0 PID: 15251 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 484.964534][T15251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 484.974434][T15251] Call Trace: [ 484.977558][T15251] [ 484.980341][T15251] dump_stack_lvl+0x151/0x1b7 [ 484.984862][T15251] ? bfq_pos_tree_add_move+0x43e/0x43e [ 484.990254][T15251] dump_stack+0x15/0x17 [ 484.994243][T15251] should_fail+0x3c0/0x510 [ 484.998497][T15251] __should_failslab+0x9f/0xe0 [ 485.003096][T15251] should_failslab+0x9/0x20 [ 485.007434][T15251] kmem_cache_alloc+0x4f/0x2f0 [ 485.012036][T15251] ? vm_area_dup+0x26/0x1d0 [ 485.016374][T15251] ? __kasan_check_read+0x11/0x20 [ 485.021244][T15251] vm_area_dup+0x26/0x1d0 [ 485.025403][T15251] dup_mmap+0x6b8/0xea0 [ 485.029405][T15251] ? __delayed_free_task+0x20/0x20 [ 485.034347][T15251] ? mm_init+0x807/0x960 [ 485.038421][T15251] dup_mm+0x91/0x330 [ 485.042154][T15251] copy_mm+0x108/0x1b0 [ 485.046058][T15251] copy_process+0x1295/0x3250 [ 485.050574][T15251] ? proc_fail_nth_write+0x213/0x290 [ 485.055696][T15251] ? proc_fail_nth_read+0x220/0x220 [ 485.060726][T15251] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 485.065767][T15251] ? vfs_write+0x9af/0x1050 [ 485.070099][T15251] ? vmacache_update+0xb7/0x120 [ 485.074797][T15251] kernel_clone+0x22d/0x990 [ 485.079127][T15251] ? file_end_write+0x1b0/0x1b0 [ 485.083814][T15251] ? __kasan_check_write+0x14/0x20 [ 485.088758][T15251] ? create_io_thread+0x1e0/0x1e0 [ 485.093620][T15251] ? __mutex_lock_slowpath+0x10/0x10 [ 485.098754][T15251] __x64_sys_clone+0x289/0x310 [ 485.103347][T15251] ? __do_sys_vfork+0x130/0x130 [ 485.108032][T15251] ? debug_smp_processor_id+0x17/0x20 [ 485.113241][T15251] do_syscall_64+0x44/0xd0 [ 485.117490][T15251] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 485.123217][T15251] RIP: 0033:0x7f8ab3ee50d9 [ 485.127471][T15251] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 485.147032][T15251] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:48:20 executing program 4: syz_clone(0xc0800400, 0x0, 0x5000000, 0x0, 0x0, 0x0) 03:48:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000006e82ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1a, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0xa00020) 03:48:20 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 33) [ 485.155295][T15251] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 485.163082][T15251] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 485.170900][T15251] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 485.178709][T15251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 485.186515][T15251] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 485.194332][T15251] 03:48:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0xb00020) 03:48:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x9) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000006e82ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=@bloom_filter={0x1e, 0x10000, 0x0, 0x101, 0x840, r1, 0x1, '\x00', 0x0, r1, 0x1, 0x0, 0x3, 0xd}, 0x48) (async, rerun: 64) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYRES16=0x0], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x41000, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x47e4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) (async) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c00)={0xffffffffffffffff, 0x4f2, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001d00)={0x11, 0x1, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x2, 0xa, 0x2, 0x8, 0x8}], &(0x7f0000000480)='syzkaller\x00', 0x7, 0x1000, &(0x7f00000009c0)=""/4096, 0x40f00, 0x10, '\x00', 0x0, 0x8, r1, 0x8, &(0x7f0000000880)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0xe, 0xfff, 0x20}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000001cc0)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, r6, r8]}, 0x80) (async) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x12, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r12]}, 0x80) (async, rerun: 32) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xe, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5a2538c9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xfffffffe}, @map_val={0x18, 0xa, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x8e92}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x26}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x84, &(0x7f0000000300)=""/132, 0x41100, 0x2, '\x00', 0x0, 0x0, r13, 0x8, &(0x7f0000000180)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x3, 0x8, 0x9}, 0x10}, 0x80) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async, rerun: 64) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 485.303397][T15283] FAULT_INJECTION: forcing a failure. [ 485.303397][T15283] name failslab, interval 1, probability 0, space 0, times 0 [ 485.342268][T15283] CPU: 1 PID: 15283 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 485.352348][T15283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 485.362253][T15283] Call Trace: [ 485.365366][T15283] [ 485.368144][T15283] dump_stack_lvl+0x151/0x1b7 [ 485.372660][T15283] ? bfq_pos_tree_add_move+0x43e/0x43e [ 485.377953][T15283] dump_stack+0x15/0x17 [ 485.381940][T15283] should_fail+0x3c0/0x510 [ 485.386204][T15283] __should_failslab+0x9f/0xe0 [ 485.390795][T15283] should_failslab+0x9/0x20 [ 485.395135][T15283] kmem_cache_alloc+0x4f/0x2f0 [ 485.399820][T15283] ? anon_vma_clone+0xa1/0x4f0 [ 485.404420][T15283] anon_vma_clone+0xa1/0x4f0 [ 485.408853][T15283] anon_vma_fork+0x91/0x4f0 [ 485.413185][T15283] ? anon_vma_name+0x4c/0x70 [ 485.417612][T15283] dup_mmap+0x750/0xea0 [ 485.421613][T15283] ? __delayed_free_task+0x20/0x20 [ 485.426557][T15283] ? mm_init+0x807/0x960 [ 485.430629][T15283] dup_mm+0x91/0x330 [ 485.434365][T15283] copy_mm+0x108/0x1b0 [ 485.438270][T15283] copy_process+0x1295/0x3250 [ 485.442787][T15283] ? proc_fail_nth_write+0x213/0x290 [ 485.447903][T15283] ? proc_fail_nth_read+0x220/0x220 [ 485.453025][T15283] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 485.457973][T15283] ? vfs_write+0x9af/0x1050 [ 485.462318][T15283] ? vmacache_update+0xb7/0x120 [ 485.467002][T15283] kernel_clone+0x22d/0x990 [ 485.471337][T15283] ? file_end_write+0x1b0/0x1b0 [ 485.476036][T15283] ? __kasan_check_write+0x14/0x20 [ 485.480972][T15283] ? create_io_thread+0x1e0/0x1e0 [ 485.485831][T15283] ? __mutex_lock_slowpath+0x10/0x10 [ 485.490954][T15283] __x64_sys_clone+0x289/0x310 [ 485.495561][T15283] ? __do_sys_vfork+0x130/0x130 [ 485.500240][T15283] ? debug_smp_processor_id+0x17/0x20 [ 485.505448][T15283] do_syscall_64+0x44/0xd0 [ 485.509873][T15283] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 485.515608][T15283] RIP: 0033:0x7f8ab3ee50d9 [ 485.519855][T15283] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 485.539398][T15283] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:48:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0xc00020) 03:48:21 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 34) 03:48:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000006e82ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 485.547639][T15283] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 485.555449][T15283] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 485.563262][T15283] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 485.571074][T15283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 485.578883][T15283] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 485.586701][T15283] 03:48:21 executing program 4: syz_clone(0xc0800400, 0x0, 0x7000000, 0x0, 0x0, 0x0) 03:48:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1c, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0xd00020) 03:48:21 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=@bloom_filter={0x1e, 0x10000, 0x0, 0x101, 0x840, r1, 0x1, '\x00', 0x0, r1, 0x1, 0x0, 0x3, 0xd}, 0x48) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYRES16=0x0], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x41000, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x47e4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c00)={0xffffffffffffffff, 0x4f2, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001d00)={0x11, 0x1, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x2, 0xa, 0x2, 0x8, 0x8}], &(0x7f0000000480)='syzkaller\x00', 0x7, 0x1000, &(0x7f00000009c0)=""/4096, 0x40f00, 0x10, '\x00', 0x0, 0x8, r1, 0x8, &(0x7f0000000880)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0xe, 0xfff, 0x20}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000001cc0)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, r6, r8]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x12, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r12]}, 0x80) (async, rerun: 32) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xe, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5a2538c9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xfffffffe}, @map_val={0x18, 0xa, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x8e92}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x26}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x84, &(0x7f0000000300)=""/132, 0x41100, 0x2, '\x00', 0x0, 0x0, r13, 0x8, &(0x7f0000000180)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x3, 0x8, 0x9}, 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0xe00020) 03:48:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x9, 0x97, 0x80, 0x2, 0x0, 0x1, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x800b, 0x1000, 0x4, 0x8, 0x6, 0x0, 0x163, 0x0, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x9) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1d, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) [ 485.715352][T15323] FAULT_INJECTION: forcing a failure. [ 485.715352][T15323] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 485.743538][T15323] CPU: 0 PID: 15323 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 485.753607][T15323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 485.763508][T15323] Call Trace: [ 485.766623][T15323] [ 485.769400][T15323] dump_stack_lvl+0x151/0x1b7 [ 485.773912][T15323] ? bfq_pos_tree_add_move+0x43e/0x43e [ 485.779208][T15323] dump_stack+0x15/0x17 [ 485.783201][T15323] should_fail+0x3c0/0x510 [ 485.787453][T15323] should_fail_alloc_page+0x58/0x70 [ 485.792494][T15323] __alloc_pages+0x1de/0x7c0 [ 485.796915][T15323] ? __count_vm_events+0x30/0x30 [ 485.801691][T15323] ? dup_mm+0x91/0x330 [ 485.805592][T15323] ? copy_mm+0x108/0x1b0 [ 485.809671][T15323] ? copy_process+0x1295/0x3250 [ 485.814444][T15323] ? kernel_clone+0x22d/0x990 [ 485.818957][T15323] ? __x64_sys_clone+0x289/0x310 [ 485.823738][T15323] pte_alloc_one+0x73/0x1b0 [ 485.828072][T15323] ? pfn_modify_allowed+0x2e0/0x2e0 [ 485.833108][T15323] ? __kasan_check_write+0x14/0x20 [ 485.838060][T15323] ? __set_page_owner+0x2ee/0x310 [ 485.842928][T15323] __pte_alloc+0x86/0x350 [ 485.847080][T15323] ? post_alloc_hook+0x1ab/0x1b0 [ 485.851868][T15323] ? free_pgtables+0x210/0x210 [ 485.856487][T15323] ? get_page_from_freelist+0x38b/0x400 [ 485.861838][T15323] copy_pte_range+0x1b1f/0x20b0 [ 485.866529][T15323] ? __kunmap_atomic+0x80/0x80 [ 485.871123][T15323] ? __pud_alloc+0x260/0x260 [ 485.875552][T15323] ? __pud_alloc+0x218/0x260 [ 485.879977][T15323] ? do_handle_mm_fault+0x2370/0x2370 [ 485.885188][T15323] copy_page_range+0xc1e/0x1090 [ 485.889875][T15323] ? pfn_valid+0x1e0/0x1e0 [ 485.894124][T15323] dup_mmap+0x99f/0xea0 [ 485.898118][T15323] ? __delayed_free_task+0x20/0x20 [ 485.903062][T15323] ? mm_init+0x807/0x960 [ 485.907144][T15323] dup_mm+0x91/0x330 [ 485.910875][T15323] copy_mm+0x108/0x1b0 [ 485.914779][T15323] copy_process+0x1295/0x3250 [ 485.919297][T15323] ? proc_fail_nth_write+0x213/0x290 [ 485.924416][T15323] ? proc_fail_nth_read+0x220/0x220 [ 485.929538][T15323] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 485.934482][T15323] ? vfs_write+0x9af/0x1050 [ 485.938820][T15323] ? vmacache_update+0xb7/0x120 [ 485.943511][T15323] kernel_clone+0x22d/0x990 [ 485.947861][T15323] ? file_end_write+0x1b0/0x1b0 [ 485.952534][T15323] ? __kasan_check_write+0x14/0x20 [ 485.957482][T15323] ? create_io_thread+0x1e0/0x1e0 [ 485.962347][T15323] ? __mutex_lock_slowpath+0x10/0x10 [ 485.967468][T15323] __x64_sys_clone+0x289/0x310 [ 485.972067][T15323] ? __do_sys_vfork+0x130/0x130 [ 485.976755][T15323] ? debug_smp_processor_id+0x17/0x20 [ 485.982057][T15323] do_syscall_64+0x44/0xd0 [ 485.986307][T15323] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 485.992034][T15323] RIP: 0033:0x7f8ab3ee50d9 [ 485.996293][T15323] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 03:48:21 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 35) [ 486.015732][T15323] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 486.023977][T15323] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 486.031784][T15323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 486.039600][T15323] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 486.047413][T15323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 486.055392][T15323] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 486.063211][T15323] 03:48:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0xf00020) 03:48:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x1e, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:21 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1e, 0x8001, 0x20, 0x4930, 0x208, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff, r8, 0xffffffffffffffff, r12]}, 0x80) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000000000000000000ff010000180b000003000000000000000010000018480000faffffff0000ce207df6d0cb14e085000000000000000000c2a83000000000001f3b0400fcffff50f6de46ac72e451e147a592044ede7169cfaaf8d5b1c4bf3fbf340f54265cad1b713f31f3f20de79d8d8bc3ffbaf8c3b20d20c90d0dfe7711c5e13cb74cd6693d146170bb07b291df3a8ee8b5f31b7ce0bf22f2eaa444b3305160132bb9e44a6d975cb528e19e99e31a77ccaf25bbdb4408e9118c17e2187d41880940b673fb777170de7c5b6d5eb7f726b47b3c622acb17fc83d1838d859f5bd284ce1557a942f1029641c77aa0f8"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000300)=""/192, 0x41000, 0x6, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x5, 0x9, 0xa66}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, r2, r4, r9, r13]}, 0x80) syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x21, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) [ 486.133125][T15335] FAULT_INJECTION: forcing a failure. [ 486.133125][T15335] name failslab, interval 1, probability 0, space 0, times 0 [ 486.175441][T15335] CPU: 1 PID: 15335 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 486.185517][T15335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 486.195412][T15335] Call Trace: [ 486.198535][T15335] [ 486.201313][T15335] dump_stack_lvl+0x151/0x1b7 [ 486.205825][T15335] ? bfq_pos_tree_add_move+0x43e/0x43e [ 486.211122][T15335] dump_stack+0x15/0x17 [ 486.215109][T15335] should_fail+0x3c0/0x510 [ 486.219365][T15335] __should_failslab+0x9f/0xe0 [ 486.223964][T15335] should_failslab+0x9/0x20 [ 486.228304][T15335] kmem_cache_alloc+0x4f/0x2f0 [ 486.232905][T15335] ? anon_vma_clone+0xa1/0x4f0 [ 486.237502][T15335] anon_vma_clone+0xa1/0x4f0 [ 486.241930][T15335] anon_vma_fork+0x91/0x4f0 [ 486.246269][T15335] ? anon_vma_name+0x4c/0x70 [ 486.250874][T15335] dup_mmap+0x750/0xea0 [ 486.254865][T15335] ? __delayed_free_task+0x20/0x20 [ 486.259812][T15335] ? mm_init+0x807/0x960 [ 486.263888][T15335] dup_mm+0x91/0x330 [ 486.267623][T15335] copy_mm+0x108/0x1b0 [ 486.271615][T15335] copy_process+0x1295/0x3250 [ 486.276128][T15335] ? proc_fail_nth_write+0x213/0x290 [ 486.281249][T15335] ? proc_fail_nth_read+0x220/0x220 [ 486.286285][T15335] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 486.291231][T15335] ? vfs_write+0x9af/0x1050 [ 486.295748][T15335] ? vmacache_update+0xb7/0x120 [ 486.300433][T15335] kernel_clone+0x22d/0x990 [ 486.304771][T15335] ? file_end_write+0x1b0/0x1b0 [ 486.309456][T15335] ? __kasan_check_write+0x14/0x20 [ 486.314408][T15335] ? create_io_thread+0x1e0/0x1e0 [ 486.319274][T15335] ? __mutex_lock_slowpath+0x10/0x10 [ 486.324388][T15335] __x64_sys_clone+0x289/0x310 [ 486.328988][T15335] ? __do_sys_vfork+0x130/0x130 [ 486.333674][T15335] ? debug_smp_processor_id+0x17/0x20 [ 486.338969][T15335] do_syscall_64+0x44/0xd0 [ 486.343307][T15335] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 486.349036][T15335] RIP: 0033:0x7f8ab3ee50d9 [ 486.353291][T15335] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 486.372843][T15335] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 486.381152][T15335] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 486.388959][T15335] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 486.396781][T15335] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 486.404586][T15335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 486.412394][T15335] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 486.420214][T15335] 03:48:22 executing program 4: syz_clone(0xc0800400, 0x0, 0x8000000, 0x0, 0x0, 0x0) 03:48:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x200000a0) 03:48:22 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36) 03:48:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x9, 0x97, 0x80, 0x2, 0x0, 0x1, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x800b, 0x1000, 0x4, 0x8, 0x6, 0x0, 0x163, 0x0, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x9) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x22, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:22 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1e, 0x8001, 0x20, 0x4930, 0x208, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff, r8, 0xffffffffffffffff, r12]}, 0x80) (async) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000000000000000000ff010000180b000003000000000000000010000018480000faffffff0000ce207df6d0cb14e085000000000000000000c2a83000000000001f3b0400fcffff50f6de46ac72e451e147a592044ede7169cfaaf8d5b1c4bf3fbf340f54265cad1b713f31f3f20de79d8d8bc3ffbaf8c3b20d20c90d0dfe7711c5e13cb74cd6693d146170bb07b291df3a8ee8b5f31b7ce0bf22f2eaa444b3305160132bb9e44a6d975cb528e19e99e31a77ccaf25bbdb4408e9118c17e2187d41880940b673fb777170de7c5b6d5eb7f726b47b3c622acb17fc83d1838d859f5bd284ce1557a942f1029641c77aa0f8"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000300)=""/192, 0x41000, 0x6, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x5, 0x9, 0xa66}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, r2, r4, r9, r13]}, 0x80) (async) syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:22 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x7, 0xffff, 0x100, 0x88, r0, 0x200, '\x00', r1, r0, 0x3, 0x0, 0x3, 0x4}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r6, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r9]}, 0x80) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0xe2f, 0x0, 0x9, 0x2, r0, 0x9, '\x00', r1, r0, 0x3, 0x2, 0x4, 0xb}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0xffffffffffffffff, 0x1, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x1a, 0x0, 0xfffffffffffffffc, &(0x7f0000000440)='syzkaller\x00', 0xdd, 0xd1, &(0x7f0000000480)=""/209, 0x41100, 0x1, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0xb, 0x78a, 0xff}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[r4, r0, r0, r9, r10, r11, r12, r0]}, 0x80) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0x56, 0x1ff, 0x4, 0x4, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x0, 0x1, 0xe}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r13, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x23, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) [ 486.677651][T15355] FAULT_INJECTION: forcing a failure. [ 486.677651][T15355] name failslab, interval 1, probability 0, space 0, times 0 [ 486.704352][T15355] CPU: 0 PID: 15355 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 486.714423][T15355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 486.724328][T15355] Call Trace: [ 486.727438][T15355] [ 486.730220][T15355] dump_stack_lvl+0x151/0x1b7 [ 486.734993][T15355] ? bfq_pos_tree_add_move+0x43e/0x43e [ 486.740296][T15355] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 486.746535][T15355] dump_stack+0x15/0x17 [ 486.750526][T15355] should_fail+0x3c0/0x510 [ 486.754780][T15355] __should_failslab+0x9f/0xe0 [ 486.759378][T15355] should_failslab+0x9/0x20 [ 486.763717][T15355] kmem_cache_alloc+0x4f/0x2f0 [ 486.768324][T15355] ? anon_vma_fork+0xf7/0x4f0 [ 486.773006][T15355] anon_vma_fork+0xf7/0x4f0 [ 486.777344][T15355] ? anon_vma_name+0x4c/0x70 [ 486.781773][T15355] dup_mmap+0x750/0xea0 [ 486.785767][T15355] ? __delayed_free_task+0x20/0x20 [ 486.790711][T15355] ? mm_init+0x807/0x960 [ 486.794793][T15355] dup_mm+0x91/0x330 [ 486.798525][T15355] copy_mm+0x108/0x1b0 [ 486.802430][T15355] copy_process+0x1295/0x3250 [ 486.806943][T15355] ? proc_fail_nth_write+0x213/0x290 [ 486.812064][T15355] ? proc_fail_nth_read+0x220/0x220 [ 486.817120][T15355] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 486.822044][T15355] ? vfs_write+0x9af/0x1050 [ 486.826385][T15355] ? vmacache_update+0xb7/0x120 [ 486.831078][T15355] kernel_clone+0x22d/0x990 [ 486.835411][T15355] ? file_end_write+0x1b0/0x1b0 [ 486.840100][T15355] ? __kasan_check_write+0x14/0x20 [ 486.845046][T15355] ? create_io_thread+0x1e0/0x1e0 [ 486.849913][T15355] ? __mutex_lock_slowpath+0x10/0x10 [ 486.855026][T15355] __x64_sys_clone+0x289/0x310 [ 486.859629][T15355] ? __do_sys_vfork+0x130/0x130 [ 486.864318][T15355] ? debug_smp_processor_id+0x17/0x20 [ 486.869526][T15355] do_syscall_64+0x44/0xd0 [ 486.873776][T15355] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 486.879590][T15355] RIP: 0033:0x7f8ab3ee50d9 [ 486.883844][T15355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 486.903630][T15355] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 486.911877][T15355] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 486.919772][T15355] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 03:48:22 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 37) 03:48:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x9, 0x97, 0x80, 0x2, 0x0, 0x1, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x800b, 0x1000, 0x4, 0x8, 0x6, 0x0, 0x163, 0x0, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x9) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:22 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1e, 0x8001, 0x20, 0x4930, 0x208, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff, r8, 0xffffffffffffffff, r12]}, 0x80) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000000000000000000ff010000180b000003000000000000000010000018480000faffffff0000ce207df6d0cb14e085000000000000000000c2a83000000000001f3b0400fcffff50f6de46ac72e451e147a592044ede7169cfaaf8d5b1c4bf3fbf340f54265cad1b713f31f3f20de79d8d8bc3ffbaf8c3b20d20c90d0dfe7711c5e13cb74cd6693d146170bb07b291df3a8ee8b5f31b7ce0bf22f2eaa444b3305160132bb9e44a6d975cb528e19e99e31a77ccaf25bbdb4408e9118c17e2187d41880940b673fb777170de7c5b6d5eb7f726b47b3c622acb17fc83d1838d859f5bd284ce1557a942f1029641c77aa0f8"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000300)=""/192, 0x41000, 0x6, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x5, 0x9, 0xa66}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, r2, r4, r9, r13]}, 0x80) (async) syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 486.928455][T15355] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 486.936266][T15355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 486.944086][T15355] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 486.951893][T15355] 03:48:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x2}, 0x38) [ 487.067696][T15373] FAULT_INJECTION: forcing a failure. [ 487.067696][T15373] name failslab, interval 1, probability 0, space 0, times 0 [ 487.081290][T15373] CPU: 0 PID: 15373 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 487.091366][T15373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 487.101254][T15373] Call Trace: [ 487.104379][T15373] [ 487.107153][T15373] dump_stack_lvl+0x151/0x1b7 [ 487.111669][T15373] ? bfq_pos_tree_add_move+0x43e/0x43e 03:48:22 executing program 4: syz_clone(0xc0800400, 0x0, 0x9000000, 0x0, 0x0, 0x0) 03:48:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:22 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup/syz1\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 32) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x7, 0xffff, 0x100, 0x88, r0, 0x200, '\x00', r1, r0, 0x3, 0x0, 0x3, 0x4}, 0x48) (async, rerun: 32) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r6, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r9]}, 0x80) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0xe2f, 0x0, 0x9, 0x2, r0, 0x9, '\x00', r1, r0, 0x3, 0x2, 0x4, 0xb}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0xffffffffffffffff, 0x1, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x1a, 0x0, 0xfffffffffffffffc, &(0x7f0000000440)='syzkaller\x00', 0xdd, 0xd1, &(0x7f0000000480)=""/209, 0x41100, 0x1, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0xb, 0x78a, 0xff}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[r4, r0, r0, r9, r10, r11, r12, r0]}, 0x80) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0x56, 0x1ff, 0x4, 0x4, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x0, 0x1, 0xe}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r13, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x3}, 0x38) [ 487.116964][T15373] dump_stack+0x15/0x17 [ 487.120953][T15373] should_fail+0x3c0/0x510 [ 487.125209][T15373] __should_failslab+0x9f/0xe0 [ 487.129803][T15373] should_failslab+0x9/0x20 [ 487.134142][T15373] kmem_cache_alloc+0x4f/0x2f0 [ 487.138744][T15373] ? vm_area_dup+0x26/0x1d0 [ 487.143175][T15373] vm_area_dup+0x26/0x1d0 [ 487.147336][T15373] dup_mmap+0x6b8/0xea0 [ 487.151330][T15373] ? __delayed_free_task+0x20/0x20 [ 487.156277][T15373] ? mm_init+0x807/0x960 [ 487.160354][T15373] dup_mm+0x91/0x330 [ 487.164087][T15373] copy_mm+0x108/0x1b0 [ 487.167998][T15373] copy_process+0x1295/0x3250 [ 487.172516][T15373] ? proc_fail_nth_write+0x213/0x290 [ 487.177716][T15373] ? proc_fail_nth_read+0x220/0x220 [ 487.182751][T15373] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 487.187695][T15373] ? vfs_write+0x9af/0x1050 [ 487.192383][T15373] ? vmacache_update+0xb7/0x120 [ 487.197073][T15373] kernel_clone+0x22d/0x990 [ 487.201410][T15373] ? file_end_write+0x1b0/0x1b0 [ 487.206100][T15373] ? __kasan_check_write+0x14/0x20 [ 487.211045][T15373] ? create_io_thread+0x1e0/0x1e0 [ 487.215906][T15373] ? __mutex_lock_slowpath+0x10/0x10 [ 487.221027][T15373] __x64_sys_clone+0x289/0x310 [ 487.225636][T15373] ? __do_sys_vfork+0x130/0x130 [ 487.230314][T15373] ? debug_smp_processor_id+0x17/0x20 [ 487.235528][T15373] do_syscall_64+0x44/0xd0 [ 487.239774][T15373] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 487.245499][T15373] RIP: 0033:0x7f8ab3ee50d9 [ 487.249753][T15373] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 487.269197][T15373] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 487.277442][T15373] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 487.285252][T15373] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 487.293068][T15373] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 487.301142][T15373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 487.308951][T15373] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 03:48:22 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='objagg_obj_parent_assign\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:22 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 38) 03:48:22 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x7, 0xffff, 0x100, 0x88, r0, 0x200, '\x00', r1, r0, 0x3, 0x0, 0x3, 0x4}, 0x48) (async, rerun: 64) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 64) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async, rerun: 32) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 32) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r6, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r9]}, 0x80) (async, rerun: 32) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0xe2f, 0x0, 0x9, 0x2, r0, 0x9, '\x00', r1, r0, 0x3, 0x2, 0x4, 0xb}, 0x48) (async, rerun: 32) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0xffffffffffffffff, 0x1, 0x18}, 0xc) (async) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x1a, 0x0, 0xfffffffffffffffc, &(0x7f0000000440)='syzkaller\x00', 0xdd, 0xd1, &(0x7f0000000480)=""/209, 0x41100, 0x1, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0xb, 0x78a, 0xff}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[r4, r0, r0, r9, r10, r11, r12, r0]}, 0x80) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0x56, 0x1ff, 0x4, 0x4, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x0, 0x1, 0xe}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r13, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:22 executing program 4: syz_clone(0xc0800400, 0x0, 0x10000200, 0x0, 0x0, 0x0) [ 487.316764][T15373] 03:48:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x8}, 0x38) 03:48:22 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='objagg_obj_parent_assign\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 487.367314][T15409] FAULT_INJECTION: forcing a failure. [ 487.367314][T15409] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 487.395401][T15409] CPU: 0 PID: 15409 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 487.405480][T15409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 03:48:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0xeec, 0x5, 0x2, 0x0, r0, 0x2, '\x00', 0x0, r1, 0x1, 0x2, 0x1, 0xa}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) [ 487.415378][T15409] Call Trace: [ 487.418495][T15409] [ 487.421273][T15409] dump_stack_lvl+0x151/0x1b7 [ 487.425787][T15409] ? bfq_pos_tree_add_move+0x43e/0x43e [ 487.431083][T15409] ? __kasan_check_write+0x14/0x20 [ 487.436028][T15409] ? __set_page_owner+0x2ee/0x310 [ 487.440982][T15409] dump_stack+0x15/0x17 [ 487.444971][T15409] should_fail+0x3c0/0x510 [ 487.449224][T15409] should_fail_alloc_page+0x58/0x70 [ 487.454256][T15409] __alloc_pages+0x1de/0x7c0 [ 487.458685][T15409] ? __count_vm_events+0x30/0x30 [ 487.463458][T15409] ? __count_vm_events+0x30/0x30 [ 487.468232][T15409] ? __kasan_check_write+0x14/0x20 [ 487.473179][T15409] ? _raw_spin_lock+0xa3/0x1b0 [ 487.477779][T15409] __pmd_alloc+0xb1/0x550 [ 487.481942][T15409] ? kmem_cache_alloc+0x189/0x2f0 [ 487.486803][T15409] ? anon_vma_fork+0x1b9/0x4f0 [ 487.491403][T15409] ? __pud_alloc+0x260/0x260 [ 487.495827][T15409] ? __pud_alloc+0x218/0x260 [ 487.500258][T15409] ? do_handle_mm_fault+0x2370/0x2370 [ 487.505472][T15409] copy_page_range+0xd04/0x1090 [ 487.510166][T15409] ? pfn_valid+0x1e0/0x1e0 [ 487.514405][T15409] dup_mmap+0x99f/0xea0 [ 487.518397][T15409] ? __delayed_free_task+0x20/0x20 [ 487.523430][T15409] ? mm_init+0x807/0x960 [ 487.527508][T15409] dup_mm+0x91/0x330 [ 487.531242][T15409] copy_mm+0x108/0x1b0 [ 487.535152][T15409] copy_process+0x1295/0x3250 [ 487.539675][T15409] ? proc_fail_nth_write+0x213/0x290 [ 487.544868][T15409] ? proc_fail_nth_read+0x220/0x220 [ 487.549901][T15409] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 487.554857][T15409] ? vfs_write+0x9af/0x1050 [ 487.559186][T15409] ? vmacache_update+0xb7/0x120 [ 487.563876][T15409] kernel_clone+0x22d/0x990 [ 487.568214][T15409] ? file_end_write+0x1b0/0x1b0 [ 487.572903][T15409] ? __kasan_check_write+0x14/0x20 [ 487.577858][T15409] ? create_io_thread+0x1e0/0x1e0 [ 487.582710][T15409] ? __mutex_lock_slowpath+0x10/0x10 [ 487.587834][T15409] __x64_sys_clone+0x289/0x310 [ 487.592431][T15409] ? __do_sys_vfork+0x130/0x130 [ 487.597123][T15409] ? debug_smp_processor_id+0x17/0x20 [ 487.602423][T15409] do_syscall_64+0x44/0xd0 [ 487.606676][T15409] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 487.612403][T15409] RIP: 0033:0x7f8ab3ee50d9 [ 487.616655][T15409] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 487.636185][T15409] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 487.644434][T15409] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 487.652335][T15409] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 487.660157][T15409] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 03:48:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x1) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xf}, 0x38) 03:48:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0xeec, 0x5, 0x2, 0x0, r0, 0x2, '\x00', 0x0, r1, 0x1, 0x2, 0x1, 0xa}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:23 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 39) 03:48:23 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='objagg_obj_parent_assign\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 487.668047][T15409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 487.675856][T15409] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 487.683674][T15409] 03:48:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x1) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) 03:48:23 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 03:48:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x10}, 0x38) 03:48:23 executing program 4: syz_clone(0xc0800400, 0x0, 0x1f000000, 0x0, 0x0, 0x0) [ 487.754255][T15444] FAULT_INJECTION: forcing a failure. [ 487.754255][T15444] name failslab, interval 1, probability 0, space 0, times 0 [ 487.767054][T15444] CPU: 0 PID: 15444 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 487.777124][T15444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 487.787017][T15444] Call Trace: [ 487.790142][T15444] [ 487.792918][T15444] dump_stack_lvl+0x151/0x1b7 [ 487.797428][T15444] ? bfq_pos_tree_add_move+0x43e/0x43e [ 487.802726][T15444] dump_stack+0x15/0x17 [ 487.806726][T15444] should_fail+0x3c0/0x510 [ 487.811403][T15444] __should_failslab+0x9f/0xe0 [ 487.816003][T15444] should_failslab+0x9/0x20 [ 487.820342][T15444] kmem_cache_alloc+0x4f/0x2f0 [ 487.824944][T15444] ? vm_area_dup+0x26/0x1d0 [ 487.829292][T15444] vm_area_dup+0x26/0x1d0 [ 487.833450][T15444] dup_mmap+0x6b8/0xea0 [ 487.837443][T15444] ? __delayed_free_task+0x20/0x20 [ 487.842387][T15444] ? mm_init+0x807/0x960 [ 487.846471][T15444] dup_mm+0x91/0x330 [ 487.850201][T15444] copy_mm+0x108/0x1b0 [ 487.854124][T15444] copy_process+0x1295/0x3250 [ 487.858621][T15444] ? proc_fail_nth_write+0x213/0x290 [ 487.863740][T15444] ? proc_fail_nth_read+0x220/0x220 [ 487.868776][T15444] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 487.873721][T15444] ? vfs_write+0x9af/0x1050 [ 487.878071][T15444] ? vmacache_update+0xb7/0x120 [ 487.882746][T15444] kernel_clone+0x22d/0x990 [ 487.887099][T15444] ? file_end_write+0x1b0/0x1b0 [ 487.891784][T15444] ? __kasan_check_write+0x14/0x20 [ 487.896719][T15444] ? create_io_thread+0x1e0/0x1e0 [ 487.901587][T15444] ? __mutex_lock_slowpath+0x10/0x10 [ 487.906701][T15444] __x64_sys_clone+0x289/0x310 [ 487.911304][T15444] ? __do_sys_vfork+0x130/0x130 [ 487.915990][T15444] ? debug_smp_processor_id+0x17/0x20 [ 487.921198][T15444] do_syscall_64+0x44/0xd0 [ 487.925452][T15444] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 487.931178][T15444] RIP: 0033:0x7f8ab3ee50d9 [ 487.935434][T15444] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 487.954871][T15444] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 487.963116][T15444] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 487.970929][T15444] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 487.978741][T15444] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 487.986553][T15444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 487.994364][T15444] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 488.002441][T15444] 03:48:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x21}, 0x38) 03:48:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0xeec, 0x5, 0x2, 0x0, r0, 0x2, '\x00', 0x0, r1, 0x1, 0x2, 0x1, 0xa}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={r1, 0x4, 0x18}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x31ac, 0x0, 0x0, 0x0, 0xfffffffe}], &(0x7f0000000100)='GPL\x00', 0x81, 0x5b, &(0x7f0000000200)=""/91, 0x41100, 0x12, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xd, 0x5, 0xd218}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r3, r3, r3, r4, 0x1, r3]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x300}, 0x38) 03:48:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc, 0x4, 0x53, 0x2, 0x80, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xf00}, 0x38) 03:48:23 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 40) 03:48:23 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 03:48:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x2000}, 0x38) 03:48:23 executing program 4: syz_clone(0xc0800400, 0x0, 0x1ffff000, 0x0, 0x0, 0x0) [ 488.101183][T15481] FAULT_INJECTION: forcing a failure. [ 488.101183][T15481] name failslab, interval 1, probability 0, space 0, times 0 [ 488.121860][T15481] CPU: 0 PID: 15481 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 488.131957][T15481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 488.141828][T15481] Call Trace: [ 488.144954][T15481] [ 488.147727][T15481] dump_stack_lvl+0x151/0x1b7 [ 488.152246][T15481] ? bfq_pos_tree_add_move+0x43e/0x43e [ 488.157540][T15481] dump_stack+0x15/0x17 [ 488.161527][T15481] should_fail+0x3c0/0x510 [ 488.165785][T15481] __should_failslab+0x9f/0xe0 [ 488.170379][T15481] should_failslab+0x9/0x20 [ 488.174722][T15481] kmem_cache_alloc+0x4f/0x2f0 [ 488.179319][T15481] ? vm_area_dup+0x26/0x1d0 [ 488.183661][T15481] vm_area_dup+0x26/0x1d0 [ 488.187834][T15481] dup_mmap+0x6b8/0xea0 [ 488.191820][T15481] ? __delayed_free_task+0x20/0x20 [ 488.196774][T15481] ? mm_init+0x807/0x960 [ 488.200845][T15481] dup_mm+0x91/0x330 [ 488.204576][T15481] copy_mm+0x108/0x1b0 [ 488.208483][T15481] copy_process+0x1295/0x3250 [ 488.213002][T15481] ? proc_fail_nth_write+0x213/0x290 [ 488.218116][T15481] ? proc_fail_nth_read+0x220/0x220 [ 488.223153][T15481] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 488.228098][T15481] ? vfs_write+0x9af/0x1050 [ 488.232439][T15481] ? vmacache_update+0xb7/0x120 [ 488.237126][T15481] kernel_clone+0x22d/0x990 [ 488.241464][T15481] ? file_end_write+0x1b0/0x1b0 [ 488.246152][T15481] ? __kasan_check_write+0x14/0x20 [ 488.251100][T15481] ? create_io_thread+0x1e0/0x1e0 [ 488.255960][T15481] ? __mutex_lock_slowpath+0x10/0x10 [ 488.261080][T15481] __x64_sys_clone+0x289/0x310 [ 488.265680][T15481] ? __do_sys_vfork+0x130/0x130 [ 488.270373][T15481] ? debug_smp_processor_id+0x17/0x20 [ 488.275577][T15481] do_syscall_64+0x44/0xd0 [ 488.279921][T15481] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 488.285729][T15481] RIP: 0033:0x7f8ab3ee50d9 [ 488.289983][T15481] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 488.309425][T15481] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 488.317678][T15481] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 488.325482][T15481] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 488.333296][T15481] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 488.341107][T15481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:48:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={r1, 0x4, 0x18}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x31ac, 0x0, 0x0, 0x0, 0xfffffffe}], &(0x7f0000000100)='GPL\x00', 0x81, 0x5b, &(0x7f0000000200)=""/91, 0x41100, 0x12, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xd, 0x5, 0xd218}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r3, r3, r3, r4, 0x1, r3]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={r1, 0x4, 0x18}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x31ac, 0x0, 0x0, 0x0, 0xfffffffe}], &(0x7f0000000100)='GPL\x00', 0x81, 0x5b, &(0x7f0000000200)=""/91, 0x41100, 0x12, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xd, 0x5, 0xd218}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r3, r3, r3, r4, 0x1, r3]}, 0x80) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) 03:48:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x60ff}, 0x38) 03:48:23 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) (async) 03:48:23 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 41) 03:48:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc, 0x4, 0x53, 0x2, 0x80, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:23 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x6, 0x8, 0x3, 0x1409, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0xb}, 0x48) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xf, 0x8, 0x9, 0xfffffffa, 0x120, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x3, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1d, 0xffffff80, 0x3, 0x88, 0x400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x7, &(0x7f0000000080)=@raw=[@exit, @map_val={0x18, 0x6, 0x2, 0x0, r1}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x1}, @ldst={0x2, 0x0, 0x3, 0x0, 0x0, 0x4, 0x10}, @call={0x85, 0x0, 0x0, 0x3b}], &(0x7f00000000c0)='syzkaller\x00', 0x1ff, 0x54, &(0x7f0000000180)=""/84, 0x40f00, 0x18, '\x00', 0x0, 0x15, r2, 0x8, &(0x7f0000000300)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xe, 0x1, 0x4}, 0x10, 0x0, r3, 0x0, &(0x7f0000000540)=[r4, r5, r6]}, 0x80) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:23 executing program 4: syz_clone(0xc0800400, 0x0, 0x20000000, 0x0, 0x0, 0x0) [ 488.348917][T15481] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 488.356733][T15481] 03:48:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x2ffff}, 0x38) 03:48:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc, 0x4, 0x53, 0x2, 0x80, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x200000}, 0x38) 03:48:23 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x6, 0x8, 0x3, 0x1409, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0xb}, 0x48) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xf, 0x8, 0x9, 0xfffffffa, 0x120, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) (async) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x3, 0x10}, 0xc) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1d, 0xffffff80, 0x3, 0x88, 0x400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x1}, 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x7, &(0x7f0000000080)=@raw=[@exit, @map_val={0x18, 0x6, 0x2, 0x0, r1}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x1}, @ldst={0x2, 0x0, 0x3, 0x0, 0x0, 0x4, 0x10}, @call={0x85, 0x0, 0x0, 0x3b}], &(0x7f00000000c0)='syzkaller\x00', 0x1ff, 0x54, &(0x7f0000000180)=""/84, 0x40f00, 0x18, '\x00', 0x0, 0x15, r2, 0x8, &(0x7f0000000300)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xe, 0x1, 0x4}, 0x10, 0x0, r3, 0x0, &(0x7f0000000540)=[r4, r5, r6]}, 0x80) (async, rerun: 32) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 03:48:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={r1, 0x4, 0x18}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x31ac, 0x0, 0x0, 0x0, 0xfffffffe}], &(0x7f0000000100)='GPL\x00', 0x81, 0x5b, &(0x7f0000000200)=""/91, 0x41100, 0x12, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xd, 0x5, 0xd218}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r3, r3, r3, r4, 0x1, r3]}, 0x80) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x4002a0}, 0x38) 03:48:23 executing program 0: r0 = syz_clone(0x800, &(0x7f0000000040)="4149bc4a3f138a509ec9b994247309bd", 0x10, &(0x7f0000000100), &(0x7f00000002c0), &(0x7f0000000800)="5f5f88d6de6591381ff5668c2bc1826f189aa15e6f8c00662488f7af3203256e9fa5804d2e63e9f8bc95a7cf535140d254db629d60f8665283c7245417298b47e642e6df") r1 = perf_event_open$cgroup(&(0x7f0000000880)={0x1, 0x80, 0x3, 0x43, 0x3, 0x8, 0x0, 0x3ff, 0x40000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x2, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x80000, 0x4, 0x101, 0x1, 0xdf9, 0x49, 0x200, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0xff, 0x8, 0x8, 0x0, 0x10001, 0x880, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x1, @perf_config_ext={0x5, 0x8}, 0x400, 0x9, 0x2, 0x6, 0x80, 0x81, 0xb2, 0x0, 0x40008, 0x0, 0x80000000}, r0, 0x4, r1, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r6, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r9]}, 0x80) close(r6) r11 = openat$cgroup_ro(r10, &(0x7f0000000b80)='memory.events.local\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x18, 0x6, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}]}, &(0x7f0000000500)='syzkaller\x00', 0x1, 0xb6, &(0x7f00000009c0)=""/182, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x5, 0x2, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, r4, r5, 0xffffffffffffffff, r11]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES64, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x41}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 03:48:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xf0ff1f}, 0x38) [ 488.559696][T15567] FAULT_INJECTION: forcing a failure. [ 488.559696][T15567] name failslab, interval 1, probability 0, space 0, times 0 [ 488.573257][T15567] CPU: 1 PID: 15567 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 488.583325][T15567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 488.593217][T15567] Call Trace: [ 488.596340][T15567] [ 488.599118][T15567] dump_stack_lvl+0x151/0x1b7 [ 488.603636][T15567] ? bfq_pos_tree_add_move+0x43e/0x43e [ 488.609039][T15567] dump_stack+0x15/0x17 [ 488.613035][T15567] should_fail+0x3c0/0x510 [ 488.617281][T15567] __should_failslab+0x9f/0xe0 [ 488.621879][T15567] should_failslab+0x9/0x20 [ 488.626216][T15567] kmem_cache_alloc+0x4f/0x2f0 [ 488.630818][T15567] ? vm_area_dup+0x26/0x1d0 [ 488.635160][T15567] vm_area_dup+0x26/0x1d0 [ 488.639334][T15567] dup_mmap+0x6b8/0xea0 [ 488.643318][T15567] ? __delayed_free_task+0x20/0x20 [ 488.648266][T15567] ? mm_init+0x807/0x960 [ 488.652343][T15567] dup_mm+0x91/0x330 [ 488.656076][T15567] copy_mm+0x108/0x1b0 [ 488.659986][T15567] copy_process+0x1295/0x3250 [ 488.664498][T15567] ? proc_fail_nth_write+0x213/0x290 [ 488.669615][T15567] ? proc_fail_nth_read+0x220/0x220 [ 488.674650][T15567] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 488.679596][T15567] ? vfs_write+0x9af/0x1050 [ 488.683934][T15567] ? vmacache_update+0xb7/0x120 [ 488.688626][T15567] kernel_clone+0x22d/0x990 [ 488.693062][T15567] ? file_end_write+0x1b0/0x1b0 [ 488.697742][T15567] ? __kasan_check_write+0x14/0x20 [ 488.702681][T15567] ? create_io_thread+0x1e0/0x1e0 [ 488.707544][T15567] ? __mutex_lock_slowpath+0x10/0x10 [ 488.712664][T15567] __x64_sys_clone+0x289/0x310 [ 488.717526][T15567] ? __do_sys_vfork+0x130/0x130 [ 488.722222][T15567] ? debug_smp_processor_id+0x17/0x20 [ 488.727429][T15567] do_syscall_64+0x44/0xd0 [ 488.731681][T15567] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 488.737402][T15567] RIP: 0033:0x7f8ab3ee50d9 [ 488.741658][T15567] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 488.761271][T15567] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 488.769516][T15567] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 488.777326][T15567] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 488.785138][T15567] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 488.792949][T15567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 488.800758][T15567] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 03:48:24 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 42) 03:48:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) [ 488.808578][T15567] 03:48:24 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x1000000}, 0x38) 03:48:24 executing program 4: syz_clone(0xc0800400, 0x0, 0x542700a0, 0x0, 0x0, 0x0) 03:48:24 executing program 0: r0 = syz_clone(0x800, &(0x7f0000000040)="4149bc4a3f138a509ec9b994247309bd", 0x10, &(0x7f0000000100), &(0x7f00000002c0), &(0x7f0000000800)="5f5f88d6de6591381ff5668c2bc1826f189aa15e6f8c00662488f7af3203256e9fa5804d2e63e9f8bc95a7cf535140d254db629d60f8665283c7245417298b47e642e6df") (async) r1 = perf_event_open$cgroup(&(0x7f0000000880)={0x1, 0x80, 0x3, 0x43, 0x3, 0x8, 0x0, 0x3ff, 0x40000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x2, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x80000, 0x4, 0x101, 0x1, 0xdf9, 0x49, 0x200, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0xff, 0x8, 0x8, 0x0, 0x10001, 0x880, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x1, @perf_config_ext={0x5, 0x8}, 0x400, 0x9, 0x2, 0x6, 0x80, 0x81, 0xb2, 0x0, 0x40008, 0x0, 0x80000000}, r0, 0x4, r1, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) close(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r6, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r9]}, 0x80) close(r6) (async) r11 = openat$cgroup_ro(r10, &(0x7f0000000b80)='memory.events.local\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x18, 0x6, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}]}, &(0x7f0000000500)='syzkaller\x00', 0x1, 0xb6, &(0x7f00000009c0)=""/182, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x5, 0x2, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, r4, r5, 0xffffffffffffffff, r11]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES64, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x41}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 03:48:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 64) 03:48:24 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x2000000}, 0x38) 03:48:24 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x6, 0x8, 0x3, 0x1409, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0xb}, 0x48) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xf, 0x8, 0x9, 0xfffffffa, 0x120, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) (async) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x3, 0x10}, 0xc) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1d, 0xffffff80, 0x3, 0x88, 0x400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x7, &(0x7f0000000080)=@raw=[@exit, @map_val={0x18, 0x6, 0x2, 0x0, r1}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x1}, @ldst={0x2, 0x0, 0x3, 0x0, 0x0, 0x4, 0x10}, @call={0x85, 0x0, 0x0, 0x3b}], &(0x7f00000000c0)='syzkaller\x00', 0x1ff, 0x54, &(0x7f0000000180)=""/84, 0x40f00, 0x18, '\x00', 0x0, 0x15, r2, 0x8, &(0x7f0000000300)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xe, 0x1, 0x4}, 0x10, 0x0, r3, 0x0, &(0x7f0000000540)=[r4, r5, r6]}, 0x80) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:24 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x3000000}, 0x38) 03:48:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) 03:48:24 executing program 0: r0 = syz_clone(0x800, &(0x7f0000000040)="4149bc4a3f138a509ec9b994247309bd", 0x10, &(0x7f0000000100), &(0x7f00000002c0), &(0x7f0000000800)="5f5f88d6de6591381ff5668c2bc1826f189aa15e6f8c00662488f7af3203256e9fa5804d2e63e9f8bc95a7cf535140d254db629d60f8665283c7245417298b47e642e6df") r1 = perf_event_open$cgroup(&(0x7f0000000880)={0x1, 0x80, 0x3, 0x43, 0x3, 0x8, 0x0, 0x3ff, 0x40000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x2, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x80000, 0x4, 0x101, 0x1, 0xdf9, 0x49, 0x200, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0xff, 0x8, 0x8, 0x0, 0x10001, 0x880, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x1, @perf_config_ext={0x5, 0x8}, 0x400, 0x9, 0x2, 0x6, 0x80, 0x81, 0xb2, 0x0, 0x40008, 0x0, 0x80000000}, r0, 0x4, r1, 0x8) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) close(0xffffffffffffffff) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r6, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r9]}, 0x80) (async) close(r6) r11 = openat$cgroup_ro(r10, &(0x7f0000000b80)='memory.events.local\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x18, 0x6, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}]}, &(0x7f0000000500)='syzkaller\x00', 0x1, 0xb6, &(0x7f00000009c0)=""/182, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x5, 0x2, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, r4, r5, 0xffffffffffffffff, r11]}, 0x80) (async) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES64, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x41}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 03:48:24 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x8000000}, 0x38) [ 489.042771][T15639] FAULT_INJECTION: forcing a failure. [ 489.042771][T15639] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 489.055986][T15639] CPU: 1 PID: 15639 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 489.066128][T15639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 489.076019][T15639] Call Trace: [ 489.079143][T15639] [ 489.081922][T15639] dump_stack_lvl+0x151/0x1b7 [ 489.086437][T15639] ? bfq_pos_tree_add_move+0x43e/0x43e [ 489.091731][T15639] dump_stack+0x15/0x17 [ 489.095720][T15639] should_fail+0x3c0/0x510 [ 489.099975][T15639] should_fail_alloc_page+0x58/0x70 [ 489.105009][T15639] __alloc_pages+0x1de/0x7c0 [ 489.109467][T15639] ? __count_vm_events+0x30/0x30 [ 489.114207][T15639] ? __this_cpu_preempt_check+0x13/0x20 [ 489.119590][T15639] ? __mod_node_page_state+0xac/0xf0 [ 489.124711][T15639] pte_alloc_one+0x73/0x1b0 [ 489.129051][T15639] ? pfn_modify_allowed+0x2e0/0x2e0 [ 489.134088][T15639] __pte_alloc+0x86/0x350 [ 489.138252][T15639] ? free_pgtables+0x210/0x210 [ 489.142851][T15639] ? _raw_spin_lock+0xa3/0x1b0 [ 489.147454][T15639] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 489.152663][T15639] ? __kernel_text_address+0x9a/0x110 [ 489.157875][T15639] copy_pte_range+0x1b1f/0x20b0 [ 489.162556][T15639] ? __kunmap_atomic+0x80/0x80 [ 489.167153][T15639] ? __kasan_slab_alloc+0xc4/0xe0 [ 489.172024][T15639] ? __kasan_slab_alloc+0xb2/0xe0 [ 489.176886][T15639] ? kmem_cache_alloc+0x189/0x2f0 [ 489.181737][T15639] ? vm_area_dup+0x26/0x1d0 [ 489.186072][T15639] ? dup_mmap+0x6b8/0xea0 [ 489.190356][T15639] ? dup_mm+0x91/0x330 [ 489.194230][T15639] ? copy_mm+0x108/0x1b0 [ 489.198311][T15639] ? copy_process+0x1295/0x3250 [ 489.202998][T15639] ? kernel_clone+0x22d/0x990 [ 489.207516][T15639] ? __x64_sys_clone+0x289/0x310 [ 489.212288][T15639] ? do_syscall_64+0x44/0xd0 [ 489.216732][T15639] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 489.222619][T15639] copy_page_range+0xc1e/0x1090 [ 489.227307][T15639] ? pfn_valid+0x1e0/0x1e0 [ 489.231555][T15639] dup_mmap+0x99f/0xea0 [ 489.235548][T15639] ? __delayed_free_task+0x20/0x20 [ 489.240493][T15639] ? mm_init+0x807/0x960 [ 489.244574][T15639] dup_mm+0x91/0x330 [ 489.248306][T15639] copy_mm+0x108/0x1b0 [ 489.252216][T15639] copy_process+0x1295/0x3250 [ 489.256728][T15639] ? proc_fail_nth_write+0x213/0x290 [ 489.261844][T15639] ? proc_fail_nth_read+0x220/0x220 [ 489.266880][T15639] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 489.271826][T15639] ? vfs_write+0x9af/0x1050 [ 489.276166][T15639] ? vmacache_update+0xb7/0x120 [ 489.280852][T15639] kernel_clone+0x22d/0x990 [ 489.285192][T15639] ? file_end_write+0x1b0/0x1b0 [ 489.289880][T15639] ? __kasan_check_write+0x14/0x20 [ 489.294844][T15639] ? create_io_thread+0x1e0/0x1e0 [ 489.299691][T15639] ? __mutex_lock_slowpath+0x10/0x10 [ 489.304808][T15639] __x64_sys_clone+0x289/0x310 [ 489.309408][T15639] ? __do_sys_vfork+0x130/0x130 [ 489.314107][T15639] ? debug_smp_processor_id+0x17/0x20 [ 489.319308][T15639] do_syscall_64+0x44/0xd0 [ 489.323556][T15639] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 489.329286][T15639] RIP: 0033:0x7f8ab3ee50d9 [ 489.333626][T15639] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 489.353175][T15639] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 489.361419][T15639] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 489.369235][T15639] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 489.377131][T15639] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 489.384943][T15639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:48:24 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 43) 03:48:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x20005, 0xffffff20, 0x9, 0x1021, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc, 0x4}, 0x48) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000080)={&(0x7f00000002c0)="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", &(0x7f00000003c0)=""/70, &(0x7f0000000440)="42cf9b4f5223832fe25d038233fb2418dc125d4073e44b1e002c8c5a7819254a45bbe54273047866a7614635d7038bcdb2ff54828fc41e09cde27528212c24bf3966fa65324e0de7cbee494b69f609018aff8359d1a69b20f6af67ac7ef137f45d1d0dcb5e3ee8d01b84dddf82ebbb5cba8d", &(0x7f00000004c0)="3c471ee8c1157b0a8f52e9a2976e766f0846725cc61fcc6e30c2718c45723585aec062a5222c23ef92ff1e7690b0033081e1bffade0e0814ea1abd5f0c02090c7d8e22e6dd6c892e93da276c4ac270fa4351c56eab86cd653adb1531e35d986409617feabc9da15984d20e2790d9d346a19564d768c71aef776fdf904e9c0d3043784098a4d9343abedc925f2a8ba6f2c5091f8c5b8c14246bbe282edd4eab5f16", 0x0, r1, 0x4}, 0x38) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000100)="9d6c607dddafdc85b8e4539b15c10a3361e7a3e0a99717904516e1a068d674023604a070a433dc506214476cde48f51f90f04936bda10cf98d58232544ea5384d68ab1302a9602ef07b9c951a06c231dd535b471b625b3a47a34650a420f77a16266433df4161ca529d680ab618b2b13583f7c31b8", &(0x7f0000000200)=""/166}, 0x20) 03:48:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000540), 0xc}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 489.392753][T15639] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 489.400571][T15639] [ 489.443480][T15647] FAULT_INJECTION: forcing a failure. [ 489.443480][T15647] name failslab, interval 1, probability 0, space 0, times 0 [ 489.458594][T15647] CPU: 0 PID: 15647 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 489.468656][T15647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 489.478550][T15647] Call Trace: [ 489.481673][T15647] [ 489.484451][T15647] dump_stack_lvl+0x151/0x1b7 [ 489.488971][T15647] ? bfq_pos_tree_add_move+0x43e/0x43e [ 489.494260][T15647] ? do_syscall_64+0x44/0xd0 [ 489.498695][T15647] dump_stack+0x15/0x17 [ 489.502685][T15647] should_fail+0x3c0/0x510 [ 489.506934][T15647] __should_failslab+0x9f/0xe0 [ 489.511534][T15647] should_failslab+0x9/0x20 [ 489.515871][T15647] kmem_cache_alloc+0x4f/0x2f0 [ 489.520469][T15647] ? anon_vma_clone+0xa1/0x4f0 [ 489.525070][T15647] anon_vma_clone+0xa1/0x4f0 [ 489.529497][T15647] anon_vma_fork+0x91/0x4f0 [ 489.533837][T15647] ? anon_vma_name+0x4c/0x70 [ 489.538265][T15647] dup_mmap+0x750/0xea0 03:48:25 executing program 4: syz_clone(0xc0800400, 0x0, 0xa0002754, 0x0, 0x0, 0x0) 03:48:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xf000000}, 0x38) 03:48:25 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x20005, 0xffffff20, 0x9, 0x1021, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc, 0x4}, 0x48) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000080)={&(0x7f00000002c0)="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", &(0x7f00000003c0)=""/70, &(0x7f0000000440)="42cf9b4f5223832fe25d038233fb2418dc125d4073e44b1e002c8c5a7819254a45bbe54273047866a7614635d7038bcdb2ff54828fc41e09cde27528212c24bf3966fa65324e0de7cbee494b69f609018aff8359d1a69b20f6af67ac7ef137f45d1d0dcb5e3ee8d01b84dddf82ebbb5cba8d", &(0x7f00000004c0)="3c471ee8c1157b0a8f52e9a2976e766f0846725cc61fcc6e30c2718c45723585aec062a5222c23ef92ff1e7690b0033081e1bffade0e0814ea1abd5f0c02090c7d8e22e6dd6c892e93da276c4ac270fa4351c56eab86cd653adb1531e35d986409617feabc9da15984d20e2790d9d346a19564d768c71aef776fdf904e9c0d3043784098a4d9343abedc925f2a8ba6f2c5091f8c5b8c14246bbe282edd4eab5f16", 0x0, r1, 0x4}, 0x38) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000100)="9d6c607dddafdc85b8e4539b15c10a3361e7a3e0a99717904516e1a068d674023604a070a433dc506214476cde48f51f90f04936bda10cf98d58232544ea5384d68ab1302a9602ef07b9c951a06c231dd535b471b625b3a47a34650a420f77a16266433df4161ca529d680ab618b2b13583f7c31b8", &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x20005, 0xffffff20, 0x9, 0x1021, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc, 0x4}, 0x48) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000080)={&(0x7f00000002c0)="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", &(0x7f00000003c0)=""/70, &(0x7f0000000440)="42cf9b4f5223832fe25d038233fb2418dc125d4073e44b1e002c8c5a7819254a45bbe54273047866a7614635d7038bcdb2ff54828fc41e09cde27528212c24bf3966fa65324e0de7cbee494b69f609018aff8359d1a69b20f6af67ac7ef137f45d1d0dcb5e3ee8d01b84dddf82ebbb5cba8d", &(0x7f00000004c0)="3c471ee8c1157b0a8f52e9a2976e766f0846725cc61fcc6e30c2718c45723585aec062a5222c23ef92ff1e7690b0033081e1bffade0e0814ea1abd5f0c02090c7d8e22e6dd6c892e93da276c4ac270fa4351c56eab86cd653adb1531e35d986409617feabc9da15984d20e2790d9d346a19564d768c71aef776fdf904e9c0d3043784098a4d9343abedc925f2a8ba6f2c5091f8c5b8c14246bbe282edd4eab5f16", 0x0, r1, 0x4}, 0x38) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000100)="9d6c607dddafdc85b8e4539b15c10a3361e7a3e0a99717904516e1a068d674023604a070a433dc506214476cde48f51f90f04936bda10cf98d58232544ea5384d68ab1302a9602ef07b9c951a06c231dd535b471b625b3a47a34650a420f77a16266433df4161ca529d680ab618b2b13583f7c31b8", &(0x7f0000000200)=""/166}, 0x20) (async) 03:48:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000540), 0xc}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 489.542258][T15647] ? __delayed_free_task+0x20/0x20 [ 489.547215][T15647] ? mm_init+0x807/0x960 [ 489.551284][T15647] dup_mm+0x91/0x330 [ 489.555020][T15647] copy_mm+0x108/0x1b0 [ 489.558922][T15647] copy_process+0x1295/0x3250 [ 489.563528][T15647] ? proc_fail_nth_write+0x213/0x290 [ 489.568651][T15647] ? proc_fail_nth_read+0x220/0x220 [ 489.573675][T15647] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 489.578622][T15647] ? vfs_write+0x9af/0x1050 [ 489.582961][T15647] ? vmacache_update+0xb7/0x120 [ 489.587650][T15647] kernel_clone+0x22d/0x990 03:48:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x10000000}, 0x38) 03:48:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 32) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x20005, 0xffffff20, 0x9, 0x1021, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc, 0x4}, 0x48) (async, rerun: 32) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000080)={&(0x7f00000002c0)="9bb5a01962bbe492e33580e039f02221a411ddd7f6f867bbaed6a142de0a377b24176e9ceb8c200997803f9c63d0b2f03a0d609fcfb17c47963c6bff448c4e9c273767033f41f0f8bcb5c9073548611ad88c0bf9f4699e6ce8ef16da621662bfc7ba6e1e8c4898585d0fb6ecdcb3b30c6fa741e6e89f659fd4ef65a2efbe533cb9a8f2d720c3a48d00be7f4c7a587b6fd960af109a5a0cde88f53d9ee984fad086a16bf60f7e246bfda2f21804570828f742b3bf417d898772cd3e62b08f0526a47bbdaaf3e9d4fc75a7ad27fff61d8ed1337abc2d1dcb14ad76dd9b079738f3aed7d9c858535593cd8702df56b0fa3418e4886a09e098f0ec9da9fc", &(0x7f00000003c0)=""/70, &(0x7f0000000440)="42cf9b4f5223832fe25d038233fb2418dc125d4073e44b1e002c8c5a7819254a45bbe54273047866a7614635d7038bcdb2ff54828fc41e09cde27528212c24bf3966fa65324e0de7cbee494b69f609018aff8359d1a69b20f6af67ac7ef137f45d1d0dcb5e3ee8d01b84dddf82ebbb5cba8d", &(0x7f00000004c0)="3c471ee8c1157b0a8f52e9a2976e766f0846725cc61fcc6e30c2718c45723585aec062a5222c23ef92ff1e7690b0033081e1bffade0e0814ea1abd5f0c02090c7d8e22e6dd6c892e93da276c4ac270fa4351c56eab86cd653adb1531e35d986409617feabc9da15984d20e2790d9d346a19564d768c71aef776fdf904e9c0d3043784098a4d9343abedc925f2a8ba6f2c5091f8c5b8c14246bbe282edd4eab5f16", 0x0, r1, 0x4}, 0x38) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000100)="9d6c607dddafdc85b8e4539b15c10a3361e7a3e0a99717904516e1a068d674023604a070a433dc506214476cde48f51f90f04936bda10cf98d58232544ea5384d68ab1302a9602ef07b9c951a06c231dd535b471b625b3a47a34650a420f77a16266433df4161ca529d680ab618b2b13583f7c31b8", &(0x7f0000000200)=""/166}, 0x20) [ 489.591989][T15647] ? file_end_write+0x1b0/0x1b0 [ 489.596676][T15647] ? __kasan_check_write+0x14/0x20 [ 489.601623][T15647] ? create_io_thread+0x1e0/0x1e0 [ 489.606486][T15647] ? __mutex_lock_slowpath+0x10/0x10 [ 489.611608][T15647] __x64_sys_clone+0x289/0x310 [ 489.616207][T15647] ? __do_sys_vfork+0x130/0x130 [ 489.620896][T15647] ? debug_smp_processor_id+0x17/0x20 [ 489.626101][T15647] do_syscall_64+0x44/0xd0 [ 489.630352][T15647] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 489.636082][T15647] RIP: 0033:0x7f8ab3ee50d9 [ 489.640332][T15647] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 489.659777][T15647] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 489.668019][T15647] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 489.675836][T15647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 489.683734][T15647] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 03:48:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9cb9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000500)='GPL\x00', 0x1, 0xf8, &(0x7f0000000540)=""/248, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0x2, 0x4, 0x3}, 0x10}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xb, 0xb, &(0x7f0000000000)=@raw=[@generic={0x20, 0x8, 0x9, 0x80, 0x200}, @generic={0x7f, 0x3, 0x4, 0x9980, 0x7614}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x41}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff8}, @exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x1}], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd3, &(0x7f0000000100)=""/211, 0x40f00, 0x11, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x8, 0xffffffff, 0x7}, 0x10, 0x0, r0, 0x0, &(0x7f0000000380)=[0x1]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000440)={r1, 0x0, 0x25, 0x4}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r2}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x1ffff000}, 0x38) 03:48:25 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 44) 03:48:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x20000000}, 0x38) 03:48:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9cb9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000500)='GPL\x00', 0x1, 0xf8, &(0x7f0000000540)=""/248, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0x2, 0x4, 0x3}, 0x10}, 0x80) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xb, 0xb, &(0x7f0000000000)=@raw=[@generic={0x20, 0x8, 0x9, 0x80, 0x200}, @generic={0x7f, 0x3, 0x4, 0x9980, 0x7614}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x41}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff8}, @exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x1}], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd3, &(0x7f0000000100)=""/211, 0x40f00, 0x11, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x8, 0xffffffff, 0x7}, 0x10, 0x0, r0, 0x0, &(0x7f0000000380)=[0x1]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r2 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000440)={r1, 0x0, 0x25, 0x4}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r2}, 0x8) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) [ 489.691548][T15647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 489.699353][T15647] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 489.707169][T15647] 03:48:25 executing program 4: syz_clone(0xc0800400, 0x0, 0xa0024000, 0x0, 0x0, 0x0) 03:48:25 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000540), 0xc}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000540), 0xc}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) 03:48:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9cb9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000500)='GPL\x00', 0x1, 0xf8, &(0x7f0000000540)=""/248, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0x2, 0x4, 0x3}, 0x10}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xb, 0xb, &(0x7f0000000000)=@raw=[@generic={0x20, 0x8, 0x9, 0x80, 0x200}, @generic={0x7f, 0x3, 0x4, 0x9980, 0x7614}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x41}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff8}, @exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x1}], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd3, &(0x7f0000000100)=""/211, 0x40f00, 0x11, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x8, 0xffffffff, 0x7}, 0x10, 0x0, r0, 0x0, &(0x7f0000000380)=[0x1]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000440)={r1, 0x0, 0x25, 0x4}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r2}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9cb9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000500)='GPL\x00', 0x1, 0xf8, &(0x7f0000000540)=""/248, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0x2, 0x4, 0x3}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xb, 0xb, &(0x7f0000000000)=@raw=[@generic={0x20, 0x8, 0x9, 0x80, 0x200}, @generic={0x7f, 0x3, 0x4, 0x9980, 0x7614}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x41}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff8}, @exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x1}], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd3, &(0x7f0000000100)=""/211, 0x40f00, 0x11, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x8, 0xffffffff, 0x7}, 0x10, 0x0, r0, 0x0, &(0x7f0000000380)=[0x1]}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000440)={r1, 0x0, 0x25, 0x4}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r2}, 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) 03:48:25 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x21000000}, 0x38) 03:48:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r2 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x20, 0x40, 0x3, 0x1, 0x0, 0xfffffffffffffffb, 0x40000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x99, 0x4, @perf_config_ext={0x55c1, 0x8000}, 0x80, 0x8, 0x6, 0x4, 0x7fffffff, 0x4, 0x8, 0x0, 0x3, 0x0, 0xffffffff7fffffff}, 0x0, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0xffffffff) [ 489.794117][T15689] FAULT_INJECTION: forcing a failure. [ 489.794117][T15689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 489.831597][T15689] CPU: 0 PID: 15689 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 489.841680][T15689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 489.851569][T15689] Call Trace: [ 489.854692][T15689] [ 489.857469][T15689] dump_stack_lvl+0x151/0x1b7 [ 489.861983][T15689] ? bfq_pos_tree_add_move+0x43e/0x43e [ 489.867277][T15689] dump_stack+0x15/0x17 [ 489.871268][T15689] should_fail+0x3c0/0x510 [ 489.875521][T15689] should_fail_alloc_page+0x58/0x70 [ 489.880553][T15689] __alloc_pages+0x1de/0x7c0 [ 489.884986][T15689] ? __count_vm_events+0x30/0x30 [ 489.889756][T15689] ? __this_cpu_preempt_check+0x13/0x20 [ 489.895138][T15689] ? __mod_node_page_state+0xac/0xf0 [ 489.900258][T15689] pte_alloc_one+0x73/0x1b0 [ 489.904598][T15689] ? pfn_modify_allowed+0x2e0/0x2e0 [ 489.909634][T15689] __pte_alloc+0x86/0x350 [ 489.913796][T15689] ? free_pgtables+0x210/0x210 [ 489.918396][T15689] ? _raw_spin_lock+0xa3/0x1b0 [ 489.922997][T15689] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 489.928204][T15689] ? __kernel_text_address+0x9a/0x110 [ 489.933413][T15689] copy_pte_range+0x1b1f/0x20b0 [ 489.938104][T15689] ? __kunmap_atomic+0x80/0x80 [ 489.942696][T15689] ? __kasan_slab_alloc+0xc4/0xe0 [ 489.947563][T15689] ? __kasan_slab_alloc+0xb2/0xe0 [ 489.952420][T15689] ? kmem_cache_alloc+0x189/0x2f0 [ 489.957280][T15689] ? vm_area_dup+0x26/0x1d0 [ 489.961621][T15689] ? dup_mmap+0x6b8/0xea0 [ 489.965784][T15689] ? dup_mm+0x91/0x330 [ 489.969689][T15689] ? copy_mm+0x108/0x1b0 [ 489.973771][T15689] ? copy_process+0x1295/0x3250 [ 489.978457][T15689] ? kernel_clone+0x22d/0x990 [ 489.982973][T15689] ? __x64_sys_clone+0x289/0x310 [ 489.987743][T15689] ? do_syscall_64+0x44/0xd0 [ 489.992171][T15689] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 489.998078][T15689] copy_page_range+0xc1e/0x1090 [ 490.002765][T15689] ? pfn_valid+0x1e0/0x1e0 [ 490.007014][T15689] dup_mmap+0x99f/0xea0 [ 490.011016][T15689] ? __delayed_free_task+0x20/0x20 [ 490.015960][T15689] ? mm_init+0x807/0x960 [ 490.020032][T15689] dup_mm+0x91/0x330 [ 490.023763][T15689] copy_mm+0x108/0x1b0 [ 490.027669][T15689] copy_process+0x1295/0x3250 [ 490.032184][T15689] ? proc_fail_nth_write+0x213/0x290 [ 490.037303][T15689] ? proc_fail_nth_read+0x220/0x220 [ 490.042341][T15689] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 490.047286][T15689] ? vfs_write+0x9af/0x1050 [ 490.051634][T15689] ? vmacache_update+0xb7/0x120 [ 490.056319][T15689] kernel_clone+0x22d/0x990 [ 490.060651][T15689] ? file_end_write+0x1b0/0x1b0 [ 490.065340][T15689] ? __kasan_check_write+0x14/0x20 [ 490.070285][T15689] ? create_io_thread+0x1e0/0x1e0 [ 490.075152][T15689] ? __mutex_lock_slowpath+0x10/0x10 [ 490.080268][T15689] __x64_sys_clone+0x289/0x310 [ 490.084885][T15689] ? __do_sys_vfork+0x130/0x130 [ 490.089554][T15689] ? debug_smp_processor_id+0x17/0x20 [ 490.094762][T15689] do_syscall_64+0x44/0xd0 [ 490.099016][T15689] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 490.104743][T15689] RIP: 0033:0x7f8ab3ee50d9 [ 490.108998][T15689] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 490.128439][T15689] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 490.136695][T15689] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 03:48:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="6c12000088060000000000000000961c5dbf00ed7a9500f96f6c0e0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="6c12000088060000000000000000961c5dbf00ed7a9500f96f6c0e0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:25 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 45) 03:48:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="6c12000088060000000000000000961c5dbf00ed7a9500f96f6c0e0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:25 executing program 4: syz_clone(0xc0800400, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) 03:48:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xa0024000}, 0x38) 03:48:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) r2 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x20, 0x40, 0x3, 0x1, 0x0, 0xfffffffffffffffb, 0x40000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x99, 0x4, @perf_config_ext={0x55c1, 0x8000}, 0x80, 0x8, 0x6, 0x4, 0x7fffffff, 0x4, 0x8, 0x0, 0x3, 0x0, 0xffffffff7fffffff}, 0x0, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0xffffffff) [ 490.144494][T15689] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 490.152305][T15689] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 490.160127][T15689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 490.168026][T15689] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 490.175836][T15689] 03:48:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYRESHEX=r2, @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8c5e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="185a00000e0000009082ff4f0000000000000008700101000000000000fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b0000000000020000009e7ae8e28fa7401bbb1d548de9303027a8ed5e61ddf5893e79c2ca2b69d38701aaf5646ee624bd7c7dc1ee0b013296bb6f"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xf2ffffff}, 0x38) 03:48:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="ff4bdcdeb84dd1f6d6180100000002ffff00000000007fbd17"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r2 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") r3 = syz_clone(0x1000900, &(0x7f0000000080)="99cf290782f56b4b9d4ceaff69d7249516b0885eeb82fb3d5f3f02ce55f3b7af3e9187a4eccdff3d82180953b738158bf3775a91d7de665c2b28fe", 0x3b, &(0x7f0000000180), &(0x7f0000000280), &(0x7f0000000300)="2ec2b559c586a8d64dc925178eef1706a26e734df918e0de3fe431c7a57dee43a42d544dbb9ddcc6784500cdec98ac249d407e3b5031f9cf7c3995116b6d8b8e0b14") r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x38}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r5, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, r4, 0xffffffffffffffff, r4, 0xffffffffffffffff, r9]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r12]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0xd, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000040000000000000005000000186100100a000000000000000200000002b36d000500000018420000feffffff000000000000000095000000000000009500009438b96ab0e47a0000a471530c5a250f5d9cb17fc60000000518040004000000195300000f00000000000000"], &(0x7f0000000500)='syzkaller\x00', 0xde, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000680)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x0, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r9, 0xffffffffffffffff]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r3, r5, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) syz_open_procfs$namespace(r2, &(0x7f0000000200)='ns/time\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, r1, 0x0, 0x4, &(0x7f0000000000)='GPL\x00'}, 0x30) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) r2 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x20, 0x40, 0x3, 0x1, 0x0, 0xfffffffffffffffb, 0x40000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x99, 0x4, @perf_config_ext={0x55c1, 0x8000}, 0x80, 0x8, 0x6, 0x4, 0x7fffffff, 0x4, 0x8, 0x0, 0x3, 0x0, 0xffffffff7fffffff}, 0x0, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0xffffffff) [ 490.242594][T15746] FAULT_INJECTION: forcing a failure. [ 490.242594][T15746] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:48:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0x10007, 0x6, 0x5, 0x1, 0xffffffffffffffff, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1, 0xb}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18430000000000000000000000000083c85d2300", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0xab, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1d, 0xa, &(0x7f00000000c0)=@raw=[@call={0x85, 0x0, 0x0, 0xbe}, @jmp={0x5, 0x0, 0xc, 0x0, 0x2, 0x80, 0xfffffffffffffff0}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3f}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x610}, @alu={0x7, 0x1, 0xb, 0x7, 0x9, 0xfffffffffffffff8}, @exit], &(0x7f0000000140)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x16, r0, 0x8, &(0x7f0000000180)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xf, 0x20, 0x1000}, 0x10, 0x0, r2, 0x0, &(0x7f0000000300)=[r10, r1, r0, r12, r1, 0x1]}, 0x80) [ 490.308869][T15746] CPU: 1 PID: 15746 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 490.318941][T15746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 490.328834][T15746] Call Trace: [ 490.331958][T15746] [ 490.334737][T15746] dump_stack_lvl+0x151/0x1b7 [ 490.339250][T15746] ? bfq_pos_tree_add_move+0x43e/0x43e [ 490.344545][T15746] ? stack_trace_save+0x1f0/0x1f0 [ 490.349407][T15746] ? __kernel_text_address+0x9a/0x110 [ 490.354614][T15746] dump_stack+0x15/0x17 [ 490.358604][T15746] should_fail+0x3c0/0x510 [ 490.362858][T15746] should_fail_alloc_page+0x58/0x70 [ 490.367890][T15746] __alloc_pages+0x1de/0x7c0 [ 490.372316][T15746] ? stack_trace_save+0x12d/0x1f0 [ 490.377179][T15746] ? stack_trace_snprint+0x100/0x100 [ 490.382299][T15746] ? __count_vm_events+0x30/0x30 [ 490.387075][T15746] ? __kasan_slab_alloc+0xc4/0xe0 [ 490.391935][T15746] ? __kasan_slab_alloc+0xb2/0xe0 [ 490.396790][T15746] ? kmem_cache_alloc+0x189/0x2f0 [ 490.401652][T15746] ? anon_vma_fork+0x1b9/0x4f0 [ 490.406252][T15746] get_zeroed_page+0x19/0x40 [ 490.410679][T15746] __pud_alloc+0x8b/0x260 [ 490.414845][T15746] ? do_handle_mm_fault+0x2370/0x2370 [ 490.420066][T15746] copy_page_range+0xd9e/0x1090 [ 490.424742][T15746] ? pfn_valid+0x1e0/0x1e0 [ 490.429082][T15746] dup_mmap+0x99f/0xea0 [ 490.433074][T15746] ? __delayed_free_task+0x20/0x20 [ 490.438018][T15746] ? mm_init+0x807/0x960 [ 490.442099][T15746] dup_mm+0x91/0x330 [ 490.445837][T15746] copy_mm+0x108/0x1b0 [ 490.449737][T15746] copy_process+0x1295/0x3250 [ 490.454252][T15746] ? proc_fail_nth_write+0x213/0x290 [ 490.459374][T15746] ? proc_fail_nth_read+0x220/0x220 [ 490.464405][T15746] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 490.469351][T15746] ? vfs_write+0x9af/0x1050 [ 490.473692][T15746] ? vmacache_update+0xb7/0x120 [ 490.478380][T15746] kernel_clone+0x22d/0x990 [ 490.482717][T15746] ? file_end_write+0x1b0/0x1b0 [ 490.487405][T15746] ? __kasan_check_write+0x14/0x20 [ 490.492352][T15746] ? create_io_thread+0x1e0/0x1e0 [ 490.497213][T15746] ? __mutex_lock_slowpath+0x10/0x10 [ 490.502333][T15746] __x64_sys_clone+0x289/0x310 [ 490.506937][T15746] ? __do_sys_vfork+0x130/0x130 [ 490.511623][T15746] ? debug_smp_processor_id+0x17/0x20 [ 490.516848][T15746] do_syscall_64+0x44/0xd0 [ 490.521085][T15746] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 490.526820][T15746] RIP: 0033:0x7f8ab3ee50d9 [ 490.531069][T15746] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 490.550506][T15746] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:48:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xfeffffff}, 0x38) 03:48:26 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 46) [ 490.558748][T15746] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 490.566566][T15746] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 490.574371][T15746] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 490.582270][T15746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 490.590083][T15746] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 490.597900][T15746] 03:48:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r1, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYRESHEX=r2, @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8c5e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="185a00000e0000009082ff4f0000000000000008700101000000000000fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b0000000000020000009e7ae8e28fa7401bbb1d548de9303027a8ed5e61ddf5893e79c2ca2b69d38701aaf5646ee624bd7c7dc1ee0b013296bb6f"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xff600000}, 0x38) [ 490.687609][T15765] FAULT_INJECTION: forcing a failure. [ 490.687609][T15765] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 490.702911][T15765] CPU: 1 PID: 15765 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 490.712978][T15765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 490.722872][T15765] Call Trace: [ 490.725995][T15765] [ 490.728768][T15765] dump_stack_lvl+0x151/0x1b7 [ 490.733294][T15765] ? bfq_pos_tree_add_move+0x43e/0x43e [ 490.738573][T15765] ? __kasan_check_write+0x14/0x20 [ 490.743523][T15765] ? __set_page_owner+0x2ee/0x310 [ 490.748388][T15765] dump_stack+0x15/0x17 [ 490.752376][T15765] should_fail+0x3c0/0x510 [ 490.756629][T15765] should_fail_alloc_page+0x58/0x70 [ 490.761666][T15765] __alloc_pages+0x1de/0x7c0 [ 490.766107][T15765] ? __count_vm_events+0x30/0x30 [ 490.770860][T15765] ? __count_vm_events+0x30/0x30 [ 490.775633][T15765] ? __kasan_check_write+0x14/0x20 [ 490.780581][T15765] ? _raw_spin_lock+0xa3/0x1b0 [ 490.785183][T15765] __pmd_alloc+0xb1/0x550 [ 490.789347][T15765] ? kmem_cache_alloc+0x189/0x2f0 [ 490.794215][T15765] ? anon_vma_fork+0x1b9/0x4f0 [ 490.798816][T15765] ? __pud_alloc+0x260/0x260 [ 490.803240][T15765] ? __pud_alloc+0x218/0x260 [ 490.807748][T15765] ? do_handle_mm_fault+0x2370/0x2370 [ 490.812954][T15765] copy_page_range+0xd04/0x1090 [ 490.817645][T15765] ? pfn_valid+0x1e0/0x1e0 [ 490.821898][T15765] dup_mmap+0x99f/0xea0 [ 490.825888][T15765] ? __delayed_free_task+0x20/0x20 [ 490.830836][T15765] ? mm_init+0x807/0x960 [ 490.834917][T15765] dup_mm+0x91/0x330 [ 490.838646][T15765] copy_mm+0x108/0x1b0 [ 490.842553][T15765] copy_process+0x1295/0x3250 [ 490.847066][T15765] ? proc_fail_nth_write+0x213/0x290 [ 490.852189][T15765] ? proc_fail_nth_read+0x220/0x220 [ 490.857224][T15765] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 490.862167][T15765] ? vfs_write+0x9af/0x1050 [ 490.866505][T15765] ? vmacache_update+0xb7/0x120 [ 490.871194][T15765] kernel_clone+0x22d/0x990 [ 490.875535][T15765] ? file_end_write+0x1b0/0x1b0 [ 490.880221][T15765] ? __kasan_check_write+0x14/0x20 [ 490.885167][T15765] ? create_io_thread+0x1e0/0x1e0 [ 490.890029][T15765] ? __mutex_lock_slowpath+0x10/0x10 [ 490.895150][T15765] __x64_sys_clone+0x289/0x310 [ 490.899751][T15765] ? __do_sys_vfork+0x130/0x130 [ 490.904436][T15765] ? debug_smp_processor_id+0x17/0x20 [ 490.909643][T15765] do_syscall_64+0x44/0xd0 [ 490.913903][T15765] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 490.919626][T15765] RIP: 0033:0x7f8ab3ee50d9 [ 490.923880][T15765] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 490.943318][T15765] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 490.951564][T15765] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 490.959376][T15765] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 490.967189][T15765] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 490.974999][T15765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 490.982818][T15765] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 490.990625][T15765] 03:48:26 executing program 4: syz_clone(0xc0800400, 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 03:48:26 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0x10007, 0x6, 0x5, 0x1, 0xffffffffffffffff, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1, 0xb}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18430000000000000000000000000083c85d2300", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async, rerun: 32) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 32) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0xab, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1d, 0xa, &(0x7f00000000c0)=@raw=[@call={0x85, 0x0, 0x0, 0xbe}, @jmp={0x5, 0x0, 0xc, 0x0, 0x2, 0x80, 0xfffffffffffffff0}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3f}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x610}, @alu={0x7, 0x1, 0xb, 0x7, 0x9, 0xfffffffffffffff8}, @exit], &(0x7f0000000140)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x16, r0, 0x8, &(0x7f0000000180)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xf, 0x20, 0x1000}, 0x10, 0x0, r2, 0x0, &(0x7f0000000300)=[r10, r1, r0, r12, r1, 0x1]}, 0x80) 03:48:26 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 47) 03:48:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYRESHEX=r2, @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8c5e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="185a00000e0000009082ff4f0000000000000008700101000000000000fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b0000000000020000009e7ae8e28fa7401bbb1d548de9303027a8ed5e61ddf5893e79c2ca2b69d38701aaf5646ee624bd7c7dc1ee0b013296bb6f"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (rerun: 32) 03:48:26 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="ff4bdcdeb84dd1f6d6180100000002ffff00000000007fbd17"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r2 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") (async) r3 = syz_clone(0x1000900, &(0x7f0000000080)="99cf290782f56b4b9d4ceaff69d7249516b0885eeb82fb3d5f3f02ce55f3b7af3e9187a4eccdff3d82180953b738158bf3775a91d7de665c2b28fe", 0x3b, &(0x7f0000000180), &(0x7f0000000280), &(0x7f0000000300)="2ec2b559c586a8d64dc925178eef1706a26e734df918e0de3fe431c7a57dee43a42d544dbb9ddcc6784500cdec98ac249d407e3b5031f9cf7c3995116b6d8b8e0b14") (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x38}, 0x10) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (rerun: 64) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 32) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r5, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, r4, 0xffffffffffffffff, r4, 0xffffffffffffffff, r9]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r12]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0xd, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000040000000000000005000000186100100a000000000000000200000002b36d000500000018420000feffffff000000000000000095000000000000009500009438b96ab0e47a0000a471530c5a250f5d9cb17fc60000000518040004000000195300000f00000000000000"], &(0x7f0000000500)='syzkaller\x00', 0xde, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000680)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x0, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r9, 0xffffffffffffffff]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r3, r5, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) (async, rerun: 64) syz_open_procfs$namespace(r2, &(0x7f0000000200)='ns/time\x00') (rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, r1, 0x0, 0x4, &(0x7f0000000000)='GPL\x00'}, 0x30) (async, rerun: 32) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 03:48:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xffff0200}, 0x38) [ 491.124310][T15780] FAULT_INJECTION: forcing a failure. [ 491.124310][T15780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 491.140080][T15780] CPU: 1 PID: 15780 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 491.150147][T15780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 491.160037][T15780] Call Trace: [ 491.163160][T15780] [ 491.165942][T15780] dump_stack_lvl+0x151/0x1b7 [ 491.170451][T15780] ? bfq_pos_tree_add_move+0x43e/0x43e [ 491.175750][T15780] dump_stack+0x15/0x17 [ 491.179739][T15780] should_fail+0x3c0/0x510 [ 491.183991][T15780] should_fail_alloc_page+0x58/0x70 [ 491.189026][T15780] __alloc_pages+0x1de/0x7c0 [ 491.193457][T15780] ? __count_vm_events+0x30/0x30 [ 491.198228][T15780] ? dup_mm+0x91/0x330 [ 491.202132][T15780] ? copy_mm+0x108/0x1b0 [ 491.206210][T15780] ? copy_process+0x1295/0x3250 [ 491.210898][T15780] ? kernel_clone+0x22d/0x990 [ 491.215417][T15780] ? __x64_sys_clone+0x289/0x310 [ 491.220188][T15780] pte_alloc_one+0x73/0x1b0 [ 491.224527][T15780] ? pfn_modify_allowed+0x2e0/0x2e0 [ 491.229561][T15780] ? __kasan_check_write+0x14/0x20 [ 491.234508][T15780] ? __set_page_owner+0x2ee/0x310 [ 491.239373][T15780] __pte_alloc+0x86/0x350 [ 491.243534][T15780] ? post_alloc_hook+0x1ab/0x1b0 [ 491.248307][T15780] ? free_pgtables+0x210/0x210 [ 491.252907][T15780] ? get_page_from_freelist+0x38b/0x400 [ 491.258288][T15780] copy_pte_range+0x1b1f/0x20b0 [ 491.262980][T15780] ? __kunmap_atomic+0x80/0x80 [ 491.267574][T15780] ? __pud_alloc+0x260/0x260 [ 491.271999][T15780] ? __pud_alloc+0x218/0x260 [ 491.276435][T15780] ? do_handle_mm_fault+0x2370/0x2370 [ 491.281635][T15780] copy_page_range+0xc1e/0x1090 [ 491.286325][T15780] ? pfn_valid+0x1e0/0x1e0 [ 491.290575][T15780] dup_mmap+0x99f/0xea0 [ 491.294571][T15780] ? __delayed_free_task+0x20/0x20 [ 491.299512][T15780] ? mm_init+0x807/0x960 [ 491.303593][T15780] dup_mm+0x91/0x330 [ 491.307324][T15780] copy_mm+0x108/0x1b0 [ 491.311232][T15780] copy_process+0x1295/0x3250 [ 491.315751][T15780] ? proc_fail_nth_write+0x213/0x290 [ 491.320865][T15780] ? proc_fail_nth_read+0x220/0x220 [ 491.326168][T15780] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 491.331104][T15780] ? vfs_write+0x9af/0x1050 [ 491.335449][T15780] ? vmacache_update+0xb7/0x120 [ 491.340136][T15780] kernel_clone+0x22d/0x990 [ 491.344473][T15780] ? file_end_write+0x1b0/0x1b0 [ 491.349160][T15780] ? __kasan_check_write+0x14/0x20 [ 491.354108][T15780] ? create_io_thread+0x1e0/0x1e0 [ 491.358978][T15780] ? __mutex_lock_slowpath+0x10/0x10 [ 491.364088][T15780] __x64_sys_clone+0x289/0x310 [ 491.368693][T15780] ? __do_sys_vfork+0x130/0x130 [ 491.373377][T15780] ? debug_smp_processor_id+0x17/0x20 [ 491.378584][T15780] do_syscall_64+0x44/0xd0 [ 491.382836][T15780] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 491.388570][T15780] RIP: 0033:0x7f8ab3ee50d9 [ 491.392820][T15780] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 491.412267][T15780] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:48:26 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 48) [ 491.420506][T15780] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 491.428315][T15780] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 491.436305][T15780] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 491.444111][T15780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 491.451922][T15780] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 491.459738][T15780] 03:48:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xfffffff2}, 0x38) 03:48:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x81, 0x78, 0x5, 0x3f, 0x0, 0x3, 0x200, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x10000, 0x3ff}, 0x18, 0xfffffffffffffffd, 0x7f, 0x0, 0x1, 0x1, 0x1, 0x0, 0x473f, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r1, 0xb) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000dad35acc341b50aa86a1578ce06016", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 491.518000][T15793] FAULT_INJECTION: forcing a failure. [ 491.518000][T15793] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 491.534882][T15793] CPU: 1 PID: 15793 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 491.544957][T15793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 491.554853][T15793] Call Trace: [ 491.557967][T15793] [ 491.560744][T15793] dump_stack_lvl+0x151/0x1b7 [ 491.565271][T15793] ? bfq_pos_tree_add_move+0x43e/0x43e [ 491.570553][T15793] dump_stack+0x15/0x17 [ 491.574548][T15793] should_fail+0x3c0/0x510 [ 491.578811][T15793] should_fail_alloc_page+0x58/0x70 [ 491.583840][T15793] __alloc_pages+0x1de/0x7c0 [ 491.588264][T15793] ? __count_vm_events+0x30/0x30 [ 491.593035][T15793] ? __this_cpu_preempt_check+0x13/0x20 [ 491.598424][T15793] ? __mod_node_page_state+0xac/0xf0 [ 491.603550][T15793] pte_alloc_one+0x73/0x1b0 [ 491.607885][T15793] ? pfn_modify_allowed+0x2e0/0x2e0 [ 491.613097][T15793] __pte_alloc+0x86/0x350 [ 491.617254][T15793] ? free_pgtables+0x210/0x210 [ 491.621854][T15793] ? _raw_spin_lock+0xa3/0x1b0 [ 491.626461][T15793] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 491.631661][T15793] ? __kernel_text_address+0x9a/0x110 [ 491.636871][T15793] copy_pte_range+0x1b1f/0x20b0 [ 491.641562][T15793] ? __kunmap_atomic+0x80/0x80 [ 491.646157][T15793] ? __kasan_slab_alloc+0xc4/0xe0 [ 491.651020][T15793] ? __kasan_slab_alloc+0xb2/0xe0 [ 491.655884][T15793] ? kmem_cache_alloc+0x189/0x2f0 [ 491.660738][T15793] ? vm_area_dup+0x26/0x1d0 [ 491.665086][T15793] ? dup_mmap+0x6b8/0xea0 [ 491.669247][T15793] ? dup_mm+0x91/0x330 [ 491.673150][T15793] ? copy_mm+0x108/0x1b0 [ 491.677229][T15793] ? copy_process+0x1295/0x3250 [ 491.681917][T15793] ? kernel_clone+0x22d/0x990 [ 491.686428][T15793] ? __x64_sys_clone+0x289/0x310 [ 491.691202][T15793] ? do_syscall_64+0x44/0xd0 [ 491.695629][T15793] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 491.701532][T15793] copy_page_range+0xc1e/0x1090 [ 491.706221][T15793] ? pfn_valid+0x1e0/0x1e0 [ 491.710472][T15793] dup_mmap+0x99f/0xea0 [ 491.714464][T15793] ? __delayed_free_task+0x20/0x20 [ 491.719423][T15793] ? mm_init+0x807/0x960 [ 491.723499][T15793] dup_mm+0x91/0x330 [ 491.727229][T15793] copy_mm+0x108/0x1b0 [ 491.731127][T15793] copy_process+0x1295/0x3250 [ 491.735849][T15793] ? proc_fail_nth_write+0x213/0x290 [ 491.741022][T15793] ? proc_fail_nth_read+0x220/0x220 [ 491.746059][T15793] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 491.751004][T15793] ? vfs_write+0x9af/0x1050 [ 491.755342][T15793] ? vmacache_update+0xb7/0x120 [ 491.760030][T15793] kernel_clone+0x22d/0x990 [ 491.764370][T15793] ? file_end_write+0x1b0/0x1b0 [ 491.769056][T15793] ? __kasan_check_write+0x14/0x20 [ 491.774007][T15793] ? create_io_thread+0x1e0/0x1e0 [ 491.779124][T15793] ? __mutex_lock_slowpath+0x10/0x10 [ 491.784246][T15793] __x64_sys_clone+0x289/0x310 [ 491.788847][T15793] ? __do_sys_vfork+0x130/0x130 [ 491.793537][T15793] ? debug_smp_processor_id+0x17/0x20 [ 491.798761][T15793] do_syscall_64+0x44/0xd0 [ 491.802991][T15793] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 491.808719][T15793] RIP: 0033:0x7f8ab3ee50d9 [ 491.812975][T15793] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 491.832418][T15793] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 491.840667][T15793] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 491.848470][T15793] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 491.856284][T15793] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 03:48:27 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 49) 03:48:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xfffffffe}, 0x38) 03:48:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x81, 0x78, 0x5, 0x3f, 0x0, 0x3, 0x200, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x10000, 0x3ff}, 0x18, 0xfffffffffffffffd, 0x7f, 0x0, 0x1, 0x1, 0x1, 0x0, 0x473f, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r1, 0xb) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async, rerun: 32) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000dad35acc341b50aa86a1578ce06016", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 491.864098][T15793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 491.871906][T15793] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 491.879720][T15793] [ 491.967302][T15811] FAULT_INJECTION: forcing a failure. [ 491.967302][T15811] name failslab, interval 1, probability 0, space 0, times 0 [ 491.993842][T15811] CPU: 0 PID: 15811 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 492.003914][T15811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 492.013807][T15811] Call Trace: [ 492.016928][T15811] [ 492.019708][T15811] dump_stack_lvl+0x151/0x1b7 [ 492.024222][T15811] ? bfq_pos_tree_add_move+0x43e/0x43e [ 492.029513][T15811] dump_stack+0x15/0x17 [ 492.033599][T15811] should_fail+0x3c0/0x510 [ 492.037884][T15811] __should_failslab+0x9f/0xe0 [ 492.042448][T15811] should_failslab+0x9/0x20 [ 492.046787][T15811] kmem_cache_alloc+0x4f/0x2f0 [ 492.051387][T15811] ? vm_area_dup+0x26/0x1d0 [ 492.055754][T15811] vm_area_dup+0x26/0x1d0 [ 492.059898][T15811] dup_mmap+0x6b8/0xea0 [ 492.063888][T15811] ? __delayed_free_task+0x20/0x20 [ 492.068832][T15811] ? mm_init+0x807/0x960 [ 492.072915][T15811] dup_mm+0x91/0x330 [ 492.076650][T15811] copy_mm+0x108/0x1b0 [ 492.080552][T15811] copy_process+0x1295/0x3250 [ 492.085068][T15811] ? proc_fail_nth_write+0x213/0x290 [ 492.090190][T15811] ? proc_fail_nth_read+0x220/0x220 [ 492.095220][T15811] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 492.100166][T15811] ? vfs_write+0x9af/0x1050 [ 492.104516][T15811] ? vmacache_update+0xb7/0x120 [ 492.109194][T15811] kernel_clone+0x22d/0x990 [ 492.113531][T15811] ? file_end_write+0x1b0/0x1b0 [ 492.118221][T15811] ? __kasan_check_write+0x14/0x20 [ 492.123167][T15811] ? create_io_thread+0x1e0/0x1e0 [ 492.128027][T15811] ? __mutex_lock_slowpath+0x10/0x10 [ 492.133148][T15811] __x64_sys_clone+0x289/0x310 [ 492.137750][T15811] ? __do_sys_vfork+0x130/0x130 [ 492.142441][T15811] ? debug_smp_processor_id+0x17/0x20 [ 492.147646][T15811] do_syscall_64+0x44/0xd0 [ 492.151894][T15811] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 492.157623][T15811] RIP: 0033:0x7f8ab3ee50d9 [ 492.161879][T15811] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 492.181405][T15811] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 492.189648][T15811] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 492.197464][T15811] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 492.205278][T15811] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 492.213088][T15811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 492.221070][T15811] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 492.228891][T15811] 03:48:27 executing program 4: syz_clone(0xc0800400, 0x0, 0xff0f0100, 0x0, 0x0, 0x0) 03:48:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="ff4bdcdeb84dd1f6d6180100000002ffff00000000007fbd17"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) r2 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") r3 = syz_clone(0x1000900, &(0x7f0000000080)="99cf290782f56b4b9d4ceaff69d7249516b0885eeb82fb3d5f3f02ce55f3b7af3e9187a4eccdff3d82180953b738158bf3775a91d7de665c2b28fe", 0x3b, &(0x7f0000000180), &(0x7f0000000280), &(0x7f0000000300)="2ec2b559c586a8d64dc925178eef1706a26e734df918e0de3fe431c7a57dee43a42d544dbb9ddcc6784500cdec98ac249d407e3b5031f9cf7c3995116b6d8b8e0b14") (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x38}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r5, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, r4, 0xffffffffffffffff, r4, 0xffffffffffffffff, r9]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r12]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0xd, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000040000000000000005000000186100100a000000000000000200000002b36d000500000018420000feffffff000000000000000095000000000000009500009438b96ab0e47a0000a471530c5a250f5d9cb17fc60000000518040004000000195300000f00000000000000"], &(0x7f0000000500)='syzkaller\x00', 0xde, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000680)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x0, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r9, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r3, r5, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) syz_open_procfs$namespace(r2, &(0x7f0000000200)='ns/time\x00') (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, r1, 0x0, 0x4, &(0x7f0000000000)='GPL\x00'}, 0x30) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x2000000000}, 0x38) 03:48:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0x10007, 0x6, 0x5, 0x1, 0xffffffffffffffff, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1, 0xb}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18430000000000000000000000000083c85d2300", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) (async) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0xab, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1d, 0xa, &(0x7f00000000c0)=@raw=[@call={0x85, 0x0, 0x0, 0xbe}, @jmp={0x5, 0x0, 0xc, 0x0, 0x2, 0x80, 0xfffffffffffffff0}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3f}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x610}, @alu={0x7, 0x1, 0xb, 0x7, 0x9, 0xfffffffffffffff8}, @exit], &(0x7f0000000140)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x16, r0, 0x8, &(0x7f0000000180)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xf, 0x20, 0x1000}, 0x10, 0x0, r2, 0x0, &(0x7f0000000300)=[r10, r1, r0, r12, r1, 0x1]}, 0x80) 03:48:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x81, 0x78, 0x5, 0x3f, 0x0, 0x3, 0x200, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x10000, 0x3ff}, 0x18, 0xfffffffffffffffd, 0x7f, 0x0, 0x1, 0x1, 0x1, 0x0, 0x473f, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r1, 0xb) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000dad35acc341b50aa86a1578ce06016", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x81, 0x78, 0x5, 0x3f, 0x0, 0x3, 0x200, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x10000, 0x3ff}, 0x18, 0xfffffffffffffffd, 0x7f, 0x0, 0x1, 0x1, 0x1, 0x0, 0x473f, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r1, 0xb) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000dad35acc341b50aa86a1578ce06016", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) 03:48:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x2100000000}, 0x38) 03:48:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000001940)=ANY=[@ANYBLOB="18430000000000000000182700002d2da9a5cb3b338f77a98e212408e7114b97c34740022bde8a79d5bf9c3a0f497141281966bc90c96016a2489a26de80ba7fc2f105c1c2530b98000000000000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9, 0x8, 0x2, 0x1f, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xf973, 0x4, @perf_config_ext={0x20e, 0x8}, 0x14010, 0x1, 0xfaa, 0x7, 0x9, 0x2, 0x5, 0x0, 0x14, 0x0, 0x7}, 0x0, 0xb, r2, 0x8) 03:48:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x60ffffffffff}, 0x38) 03:48:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0x6, 0xfffffff7, 0x10000, 0x445, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2, 0x4}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000009c0)="6679b5d5ae045bc1bb54e0dfa0e862a8c859c2566232374034f55ccd5e605603b4847b6e37f2cc74f617ab8adfa114e3feb15e43b1ca1fca0c6f5c1d4ba2c7db323b49524ca3bec525d0caff95ee69d6088c339527367b93eb4eef4181a333c6277528e41be60ee91bd436008437629f72357d1a5f52064d33fe77d84d1b7c2ac2312b75898d7614f0290740d28c180e8cd7df9a258dac240000", &(0x7f0000000200)=""/156}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r8, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r8, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000d80)=ANY=[@ANYBLOB="1843000044a95e00020000000000008d3c1060da4a5c57648bfeacb8054293720212af7bc62490b8324890a63ce512b5a70ca664d27db93011710db00151fbf451ad455d6be0fa6d1290a80e8f3d5df8a587cd89579f8fcefd3f000000bcce05b6220f1794e186e82e13debe75cd2ed604cccc46002104a4d2d7394fde2a4a4bf7746b2795", @ANYRESDEC, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x41000, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0xfffffffc, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[r7, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r8]}, 0x80) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x10}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0xb675, 0x3, 0x80, 0x822, r2, 0x4, '\x00', 0x0, r0, 0x1, 0x1, 0x5, 0xe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000007a0a0000852000000200000018500000080000000000000000000000186900000100000000000000060000002096fffffcffffff18470000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x7, 0x11, &(0x7f0000000180)=""/17, 0x40f00, 0x3, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xa, 0x4, 0xde}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[r3, r5, r7, r9, r3, r2, 0xffffffffffffffff, r10, r11]}, 0x80) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000c40)=ANY=[@ANYBLOB="18430000000000000000182f0000000000002000d565cf6f0765bd09e41e0e2d73d1a3215b6c7d4aae06a38ced570bbcec7fd60367eb9032bcd65438bf276fe22c8c835218309137b62aa57270c560a679078dbb4c492dd308cd8d6262e280030a682ffbfe875d5616e488a46981dfd35b0b5b9a663223989adb6b505e64a4d9fe647220b738ae57f5ae650f9745993a6c0d9e3a3274c013b651b965f97263c0d93970749ab61dbced9f77b7a5b59d", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000060800408520000001000000a04ead64472273a700019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r12]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x6, 0xfff, 0x3ff, 0x2, 0x1, 0x8, '\x00', 0x0, r3, 0x4, 0x0, 0x0, 0xf}, 0x48) 03:48:27 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 50) 03:48:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000001940)=ANY=[@ANYBLOB="18430000000000000000182700002d2da9a5cb3b338f77a98e212408e7114b97c34740022bde8a79d5bf9c3a0f497141281966bc90c96016a2489a26de80ba7fc2f105c1c2530b98000000000000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9, 0x8, 0x2, 0x1f, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xf973, 0x4, @perf_config_ext={0x20e, 0x8}, 0x14010, 0x1, 0xfaa, 0x7, 0x9, 0x2, 0x5, 0x0, 0x14, 0x0, 0x7}, 0x0, 0xb, r2, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000001940)=ANY=[@ANYBLOB="18430000000000000000182700002d2da9a5cb3b338f77a98e212408e7114b97c34740022bde8a79d5bf9c3a0f497141281966bc90c96016a2489a26de80ba7fc2f105c1c2530b98000000000000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9, 0x8, 0x2, 0x1f, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xf973, 0x4, @perf_config_ext={0x20e, 0x8}, 0x14010, 0x1, 0xfaa, 0x7, 0x9, 0x2, 0x5, 0x0, 0x14, 0x0, 0x7}, 0x0, 0xb, r2, 0x8) (async) 03:48:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x7f1811d96000}, 0x38) [ 492.446967][T15864] FAULT_INJECTION: forcing a failure. [ 492.446967][T15864] name failslab, interval 1, probability 0, space 0, times 0 [ 492.488348][T15864] CPU: 0 PID: 15864 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 492.498424][T15864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 492.508322][T15864] Call Trace: [ 492.511438][T15864] [ 492.514221][T15864] dump_stack_lvl+0x151/0x1b7 [ 492.518732][T15864] ? bfq_pos_tree_add_move+0x43e/0x43e [ 492.524026][T15864] dump_stack+0x15/0x17 [ 492.528015][T15864] should_fail+0x3c0/0x510 [ 492.532270][T15864] __should_failslab+0x9f/0xe0 [ 492.536871][T15864] should_failslab+0x9/0x20 [ 492.541207][T15864] kmem_cache_alloc+0x4f/0x2f0 [ 492.545810][T15864] ? vm_area_dup+0x26/0x1d0 [ 492.550151][T15864] vm_area_dup+0x26/0x1d0 [ 492.554317][T15864] dup_mmap+0x6b8/0xea0 [ 492.558311][T15864] ? __delayed_free_task+0x20/0x20 [ 492.563256][T15864] ? mm_init+0x807/0x960 [ 492.567599][T15864] dup_mm+0x91/0x330 [ 492.571349][T15864] copy_mm+0x108/0x1b0 [ 492.575231][T15864] copy_process+0x1295/0x3250 [ 492.579754][T15864] ? proc_fail_nth_write+0x213/0x290 [ 492.584869][T15864] ? proc_fail_nth_read+0x220/0x220 [ 492.589901][T15864] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 492.594847][T15864] ? vfs_write+0x9af/0x1050 [ 492.599186][T15864] ? vmacache_update+0xb7/0x120 [ 492.603878][T15864] kernel_clone+0x22d/0x990 [ 492.608251][T15864] ? file_end_write+0x1b0/0x1b0 [ 492.612901][T15864] ? __kasan_check_write+0x14/0x20 [ 492.617849][T15864] ? create_io_thread+0x1e0/0x1e0 [ 492.622708][T15864] ? __mutex_lock_slowpath+0x10/0x10 [ 492.627917][T15864] __x64_sys_clone+0x289/0x310 [ 492.632527][T15864] ? __do_sys_vfork+0x130/0x130 [ 492.637206][T15864] ? debug_smp_processor_id+0x17/0x20 [ 492.642414][T15864] do_syscall_64+0x44/0xd0 [ 492.646673][T15864] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 492.652485][T15864] RIP: 0033:0x7f8ab3ee50d9 [ 492.656772][T15864] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 492.676276][T15864] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:48:28 executing program 4: syz_clone(0xc0800400, 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 03:48:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ff0000008d1f1000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x7f1811f96000}, 0x38) 03:48:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0x6, 0xfffffff7, 0x10000, 0x445, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2, 0x4}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000009c0)="6679b5d5ae045bc1bb54e0dfa0e862a8c859c2566232374034f55ccd5e605603b4847b6e37f2cc74f617ab8adfa114e3feb15e43b1ca1fca0c6f5c1d4ba2c7db323b49524ca3bec525d0caff95ee69d6088c339527367b93eb4eef4181a333c6277528e41be60ee91bd436008437629f72357d1a5f52064d33fe77d84d1b7c2ac2312b75898d7614f0290740d28c180e8cd7df9a258dac240000", &(0x7f0000000200)=""/156}, 0x20) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r8, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r8, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000d80)=ANY=[@ANYBLOB="1843000044a95e00020000000000008d3c1060da4a5c57648bfeacb8054293720212af7bc62490b8324890a63ce512b5a70ca664d27db93011710db00151fbf451ad455d6be0fa6d1290a80e8f3d5df8a587cd89579f8fcefd3f000000bcce05b6220f1794e186e82e13debe75cd2ed604cccc46002104a4d2d7394fde2a4a4bf7746b2795", @ANYRESDEC, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x41000, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0xfffffffc, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[r7, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r8]}, 0x80) (async) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x10}, 0x10) (async) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x10) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0xb675, 0x3, 0x80, 0x822, r2, 0x4, '\x00', 0x0, r0, 0x1, 0x1, 0x5, 0xe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000007a0a0000852000000200000018500000080000000000000000000000186900000100000000000000060000002096fffffcffffff18470000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x7, 0x11, &(0x7f0000000180)=""/17, 0x40f00, 0x3, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xa, 0x4, 0xde}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[r3, r5, r7, r9, r3, r2, 0xffffffffffffffff, r10, r11]}, 0x80) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000c40)=ANY=[@ANYBLOB="18430000000000000000182f0000000000002000d565cf6f0765bd09e41e0e2d73d1a3215b6c7d4aae06a38ced570bbcec7fd60367eb9032bcd65438bf276fe22c8c835218309137b62aa57270c560a679078dbb4c492dd308cd8d6262e280030a682ffbfe875d5616e488a46981dfd35b0b5b9a663223989adb6b505e64a4d9fe647220b738ae57f5ae650f9745993a6c0d9e3a3274c013b651b965f97263c0d93970749ab61dbced9f77b7a5b59d", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000060800408520000001000000a04ead64472273a700019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r12]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x6, 0xfff, 0x3ff, 0x2, 0x1, 0x8, '\x00', 0x0, r3, 0x4, 0x0, 0x0, 0xf}, 0x48) 03:48:28 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 51) 03:48:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000001940)=ANY=[@ANYBLOB="18430000000000000000182700002d2da9a5cb3b338f77a98e212408e7114b97c34740022bde8a79d5bf9c3a0f497141281966bc90c96016a2489a26de80ba7fc2f105c1c2530b98000000000000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9, 0x8, 0x2, 0x1f, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xf973, 0x4, @perf_config_ext={0x20e, 0x8}, 0x14010, 0x1, 0xfaa, 0x7, 0x9, 0x2, 0x5, 0x0, 0x14, 0x0, 0x7}, 0x0, 0xb, r2, 0x8) 03:48:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x2ffff00000000}, 0x38) [ 492.684612][T15864] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 492.692856][T15864] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 492.700674][T15864] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 492.708483][T15864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 492.716290][T15864] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 492.724103][T15864] 03:48:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@bloom_filter={0x1e, 0x6, 0xfffffff7, 0x10000, 0x445, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2, 0x4}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000009c0)="6679b5d5ae045bc1bb54e0dfa0e862a8c859c2566232374034f55ccd5e605603b4847b6e37f2cc74f617ab8adfa114e3feb15e43b1ca1fca0c6f5c1d4ba2c7db323b49524ca3bec525d0caff95ee69d6088c339527367b93eb4eef4181a333c6277528e41be60ee91bd436008437629f72357d1a5f52064d33fe77d84d1b7c2ac2312b75898d7614f0290740d28c180e8cd7df9a258dac240000", &(0x7f0000000200)=""/156}, 0x20) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r8, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r8, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000d80)=ANY=[@ANYBLOB="1843000044a95e00020000000000008d3c1060da4a5c57648bfeacb8054293720212af7bc62490b8324890a63ce512b5a70ca664d27db93011710db00151fbf451ad455d6be0fa6d1290a80e8f3d5df8a587cd89579f8fcefd3f000000bcce05b6220f1794e186e82e13debe75cd2ed604cccc46002104a4d2d7394fde2a4a4bf7746b2795", @ANYRESDEC, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x41000, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0xfffffffc, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[r7, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r8]}, 0x80) (async) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x10}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x10) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0xb675, 0x3, 0x80, 0x822, r2, 0x4, '\x00', 0x0, r0, 0x1, 0x1, 0x5, 0xe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000007a0a0000852000000200000018500000080000000000000000000000186900000100000000000000060000002096fffffcffffff18470000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x7, 0x11, &(0x7f0000000180)=""/17, 0x40f00, 0x3, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xa, 0x4, 0xde}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[r3, r5, r7, r9, r3, r2, 0xffffffffffffffff, r10, r11]}, 0x80) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000c40)=ANY=[@ANYBLOB="18430000000000000000182f0000000000002000d565cf6f0765bd09e41e0e2d73d1a3215b6c7d4aae06a38ced570bbcec7fd60367eb9032bcd65438bf276fe22c8c835218309137b62aa57270c560a679078dbb4c492dd308cd8d6262e280030a682ffbfe875d5616e488a46981dfd35b0b5b9a663223989adb6b505e64a4d9fe647220b738ae57f5ae650f9745993a6c0d9e3a3274c013b651b965f97263c0d93970749ab61dbced9f77b7a5b59d", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000060800408520000001000000a04ead64472273a700019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r12]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x6, 0xfff, 0x3ff, 0x2, 0x1, 0x8, '\x00', 0x0, r3, 0x4, 0x0, 0x0, 0xf}, 0x48) 03:48:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x20000000000000}, 0x38) 03:48:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001800)={r0, 0xe0, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f00000006c0), &(0x7f0000001740), 0x8, 0x10, 0x8, 0x8, &(0x7f00000017c0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001840)={&(0x7f0000001b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd6, 0xd6, 0x3, [@const={0xe, 0x0, 0x0, 0xa, 0x4}, @volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @struct={0xa, 0x6, 0x0, 0x4, 0x1, 0xa03, [{0x6, 0x4, 0x4}, {0x5, 0x4, 0x680e053e}, {0x9, 0x0, 0xd13}, {0x7, 0x0, 0x6}, {0x8, 0x2, 0x80}, {0xa, 0x0, 0xb44}]}, @const, @var={0xa, 0x0, 0x0, 0xe, 0x4, 0x1}, @volatile={0x10, 0x0, 0x0, 0x9, 0x5}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @datasec={0x1, 0x2, 0x0, 0xf, 0x2, [{0x4, 0x4a3b, 0xfffffffe}, {0x2, 0x2, 0xff}], "ecad"}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x27, 0x0, 0x1f, 0x4}]}, {0x0, [0x30]}}, &(0x7f0000001a40)=""/159, 0xf3, 0x9f, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e00)={0xffffffffffffffff, 0x20, &(0x7f0000001dc0)={&(0x7f0000001d00)=""/115, 0x73, 0x0, &(0x7f0000001d80)=""/5, 0x5}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e40)='pids.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ec0)={0x19, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3}, [@alu={0xb, 0x0, 0x5, 0x4, 0x3, 0xfffffffffffffffc, 0x1}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @alu={0x4, 0x1, 0xb, 0xb, 0xb, 0xab4f9adbb56602f9, 0xfffffffffffffffc}, @exit, @ldst={0x0, 0x3, 0x2, 0xb, 0x6, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x7fffffff, 0x5d, &(0x7f0000000640)=""/93, 0x1e00, 0x11, '\x00', r1, 0x8, r2, 0x8, &(0x7f0000001c80)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000001cc0)={0x3, 0xe, 0x4a, 0x7}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000001e80)=[r4, r0, 0xffffffffffffffff]}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 492.832758][T15905] FAULT_INJECTION: forcing a failure. [ 492.832758][T15905] name failslab, interval 1, probability 0, space 0, times 0 [ 492.846606][T15905] CPU: 0 PID: 15905 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 492.856678][T15905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 492.866573][T15905] Call Trace: [ 492.869714][T15905] [ 492.872473][T15905] dump_stack_lvl+0x151/0x1b7 [ 492.876988][T15905] ? bfq_pos_tree_add_move+0x43e/0x43e [ 492.882286][T15905] dump_stack+0x15/0x17 [ 492.886628][T15905] should_fail+0x3c0/0x510 [ 492.890877][T15905] __should_failslab+0x9f/0xe0 [ 492.895480][T15905] should_failslab+0x9/0x20 [ 492.899813][T15905] kmem_cache_alloc+0x4f/0x2f0 [ 492.904465][T15905] ? vm_area_dup+0x26/0x1d0 [ 492.908760][T15905] vm_area_dup+0x26/0x1d0 [ 492.912921][T15905] dup_mmap+0x6b8/0xea0 [ 492.916930][T15905] ? __delayed_free_task+0x20/0x20 [ 492.921868][T15905] ? mm_init+0x807/0x960 [ 492.925940][T15905] dup_mm+0x91/0x330 [ 492.929710][T15905] copy_mm+0x108/0x1b0 [ 492.933576][T15905] copy_process+0x1295/0x3250 [ 492.938092][T15905] ? proc_fail_nth_write+0x213/0x290 [ 492.943211][T15905] ? proc_fail_nth_read+0x220/0x220 [ 492.948243][T15905] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 492.953194][T15905] ? vfs_write+0x9af/0x1050 [ 492.957528][T15905] ? vmacache_update+0xb7/0x120 [ 492.962220][T15905] kernel_clone+0x22d/0x990 [ 492.966554][T15905] ? file_end_write+0x1b0/0x1b0 [ 492.971245][T15905] ? __kasan_check_write+0x14/0x20 [ 492.976193][T15905] ? create_io_thread+0x1e0/0x1e0 [ 492.981051][T15905] ? __mutex_lock_slowpath+0x10/0x10 [ 492.986175][T15905] __x64_sys_clone+0x289/0x310 [ 492.990773][T15905] ? __do_sys_vfork+0x130/0x130 [ 492.995462][T15905] ? debug_smp_processor_id+0x17/0x20 [ 493.000696][T15905] do_syscall_64+0x44/0xd0 [ 493.004919][T15905] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 493.010655][T15905] RIP: 0033:0x7f8ab3ee50d9 [ 493.014906][T15905] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 493.034345][T15905] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 493.042598][T15905] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 493.050398][T15905] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 493.058216][T15905] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 493.066022][T15905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 493.073831][T15905] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 03:48:28 executing program 4: syz_clone(0xc0800400, 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 03:48:28 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @alu={0x7, 0x1, 0xb, 0x6, 0xa, 0x1, 0x8}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xeea54c7}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xe}]}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x4, &(0x7f00000012c0)=""/4, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000001340)={0x5, 0x8, 0x8, 0x7f}, 0x10, 0x244ce, 0xffffffffffffffff, 0x0, &(0x7f0000001380)=[0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001480)={&(0x7f0000001440)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x2, 0x3, &(0x7f0000000000)=@raw=[@generic={0x4, 0x5, 0x2, 0x3, 0x9}, @jmp={0x5, 0x0, 0x4, 0xb, 0x0, 0x6, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000040)='GPL\x00', 0x0, 0x1000, &(0x7f00000002c0)=""/4096, 0x40f00, 0x18, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x4, 0x3, 0x200}, 0x10, 0x0, r0, 0x0, &(0x7f00000014c0)=[r1]}, 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x18, 0x7, &(0x7f0000001600)=@raw=[@jmp={0x5, 0x0, 0x1, 0x8, 0x6, 0xfffffffffffffff4, 0x8}, @call={0x85, 0x0, 0x0, 0x6c}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @jmp={0x5, 0x0, 0x8, 0x3, 0x4, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000001640)='syzkaller\x00', 0x80000001, 0x73, &(0x7f0000001680)=""/115, 0x41000, 0xa, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000001700)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001740)={0x0, 0x10, 0x400, 0x55e8}, 0x10}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001800)={r0, 0xe0, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f00000006c0), &(0x7f0000001740), 0x8, 0x10, 0x8, 0x8, &(0x7f00000017c0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001840)={&(0x7f0000001b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd6, 0xd6, 0x3, [@const={0xe, 0x0, 0x0, 0xa, 0x4}, @volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @struct={0xa, 0x6, 0x0, 0x4, 0x1, 0xa03, [{0x6, 0x4, 0x4}, {0x5, 0x4, 0x680e053e}, {0x9, 0x0, 0xd13}, {0x7, 0x0, 0x6}, {0x8, 0x2, 0x80}, {0xa, 0x0, 0xb44}]}, @const, @var={0xa, 0x0, 0x0, 0xe, 0x4, 0x1}, @volatile={0x10, 0x0, 0x0, 0x9, 0x5}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @datasec={0x1, 0x2, 0x0, 0xf, 0x2, [{0x4, 0x4a3b, 0xfffffffe}, {0x2, 0x2, 0xff}], "ecad"}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x27, 0x0, 0x1f, 0x4}]}, {0x0, [0x30]}}, &(0x7f0000001a40)=""/159, 0xf3, 0x9f, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e00)={0xffffffffffffffff, 0x20, &(0x7f0000001dc0)={&(0x7f0000001d00)=""/115, 0x73, 0x0, &(0x7f0000001d80)=""/5, 0x5}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e40)='pids.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ec0)={0x19, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3}, [@alu={0xb, 0x0, 0x5, 0x4, 0x3, 0xfffffffffffffffc, 0x1}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @alu={0x4, 0x1, 0xb, 0xb, 0xb, 0xab4f9adbb56602f9, 0xfffffffffffffffc}, @exit, @ldst={0x0, 0x3, 0x2, 0xb, 0x6, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x7fffffff, 0x5d, &(0x7f0000000640)=""/93, 0x1e00, 0x11, '\x00', r1, 0x8, r2, 0x8, &(0x7f0000001c80)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000001cc0)={0x3, 0xe, 0x4a, 0x7}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000001e80)=[r4, r0, 0xffffffffffffffff]}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001800)={r0, 0xe0, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f00000006c0), &(0x7f0000001740), 0x8, 0x10, 0x8, 0x8, &(0x7f00000017c0)}}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001840)={&(0x7f0000001b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd6, 0xd6, 0x3, [@const={0xe, 0x0, 0x0, 0xa, 0x4}, @volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @struct={0xa, 0x6, 0x0, 0x4, 0x1, 0xa03, [{0x6, 0x4, 0x4}, {0x5, 0x4, 0x680e053e}, {0x9, 0x0, 0xd13}, {0x7, 0x0, 0x6}, {0x8, 0x2, 0x80}, {0xa, 0x0, 0xb44}]}, @const, @var={0xa, 0x0, 0x0, 0xe, 0x4, 0x1}, @volatile={0x10, 0x0, 0x0, 0x9, 0x5}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @datasec={0x1, 0x2, 0x0, 0xf, 0x2, [{0x4, 0x4a3b, 0xfffffffe}, {0x2, 0x2, 0xff}], "ecad"}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x27, 0x0, 0x1f, 0x4}]}, {0x0, [0x30]}}, &(0x7f0000001a40)=""/159, 0xf3, 0x9f, 0x1}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e00)={0xffffffffffffffff, 0x20, &(0x7f0000001dc0)={&(0x7f0000001d00)=""/115, 0x73, 0x0, &(0x7f0000001d80)=""/5, 0x5}}, 0x10) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e40)='pids.events\x00', 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001ec0)={0x19, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3}, [@alu={0xb, 0x0, 0x5, 0x4, 0x3, 0xfffffffffffffffc, 0x1}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @alu={0x4, 0x1, 0xb, 0xb, 0xb, 0xab4f9adbb56602f9, 0xfffffffffffffffc}, @exit, @ldst={0x0, 0x3, 0x2, 0xb, 0x6, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x7fffffff, 0x5d, &(0x7f0000000640)=""/93, 0x1e00, 0x11, '\x00', r1, 0x8, r2, 0x8, &(0x7f0000001c80)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000001cc0)={0x3, 0xe, 0x4a, 0x7}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000001e80)=[r4, r0, 0xffffffffffffffff]}, 0x80) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) 03:48:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x4002a0ffffffff}, 0x38) [ 493.081652][T15905] 03:48:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ff0000008d1f1000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:28 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @alu={0x7, 0x1, 0xb, 0x6, 0xa, 0x1, 0x8}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xeea54c7}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xe}]}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x4, &(0x7f00000012c0)=""/4, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000001340)={0x5, 0x8, 0x8, 0x7f}, 0x10, 0x244ce, 0xffffffffffffffff, 0x0, &(0x7f0000001380)=[0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) (async) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001480)={&(0x7f0000001440)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x2, 0x3, &(0x7f0000000000)=@raw=[@generic={0x4, 0x5, 0x2, 0x3, 0x9}, @jmp={0x5, 0x0, 0x4, 0xb, 0x0, 0x6, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000040)='GPL\x00', 0x0, 0x1000, &(0x7f00000002c0)=""/4096, 0x40f00, 0x18, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x4, 0x3, 0x200}, 0x10, 0x0, r0, 0x0, &(0x7f00000014c0)=[r1]}, 0x80) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x18, 0x7, &(0x7f0000001600)=@raw=[@jmp={0x5, 0x0, 0x1, 0x8, 0x6, 0xfffffffffffffff4, 0x8}, @call={0x85, 0x0, 0x0, 0x6c}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @jmp={0x5, 0x0, 0x8, 0x3, 0x4, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000001640)='syzkaller\x00', 0x80000001, 0x73, &(0x7f0000001680)=""/115, 0x41000, 0xa, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000001700)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001740)={0x0, 0x10, 0x400, 0x55e8}, 0x10}, 0x80) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:28 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 52) 03:48:28 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @alu={0x7, 0x1, 0xb, 0x6, 0xa, 0x1, 0x8}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xeea54c7}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xe}]}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x4, &(0x7f00000012c0)=""/4, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000001340)={0x5, 0x8, 0x8, 0x7f}, 0x10, 0x244ce, 0xffffffffffffffff, 0x0, &(0x7f0000001380)=[0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001480)={&(0x7f0000001440)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x2, 0x3, &(0x7f0000000000)=@raw=[@generic={0x4, 0x5, 0x2, 0x3, 0x9}, @jmp={0x5, 0x0, 0x4, 0xb, 0x0, 0x6, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000040)='GPL\x00', 0x0, 0x1000, &(0x7f00000002c0)=""/4096, 0x40f00, 0x18, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x4, 0x3, 0x200}, 0x10, 0x0, r0, 0x0, &(0x7f00000014c0)=[r1]}, 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x18, 0x7, &(0x7f0000001600)=@raw=[@jmp={0x5, 0x0, 0x1, 0x8, 0x6, 0xfffffffffffffff4, 0x8}, @call={0x85, 0x0, 0x0, 0x6c}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @jmp={0x5, 0x0, 0x8, 0x3, 0x4, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000001640)='syzkaller\x00', 0x80000001, 0x73, &(0x7f0000001680)=""/115, 0x41000, 0xa, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000001700)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001740)={0x0, 0x10, 0x400, 0x55e8}, 0x10}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @alu={0x7, 0x1, 0xb, 0x6, 0xa, 0x1, 0x8}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xeea54c7}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xe}]}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x4, &(0x7f00000012c0)=""/4, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000001340)={0x5, 0x8, 0x8, 0x7f}, 0x10, 0x244ce, 0xffffffffffffffff, 0x0, &(0x7f0000001380)=[0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001480)={&(0x7f0000001440)='./file0\x00', 0x0, 0x8}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x2, 0x3, &(0x7f0000000000)=@raw=[@generic={0x4, 0x5, 0x2, 0x3, 0x9}, @jmp={0x5, 0x0, 0x4, 0xb, 0x0, 0x6, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000040)='GPL\x00', 0x0, 0x1000, &(0x7f00000002c0)=""/4096, 0x40f00, 0x18, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x4, 0x3, 0x200}, 0x10, 0x0, r0, 0x0, &(0x7f00000014c0)=[r1]}, 0x80) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x18, 0x7, &(0x7f0000001600)=@raw=[@jmp={0x5, 0x0, 0x1, 0x8, 0x6, 0xfffffffffffffff4, 0x8}, @call={0x85, 0x0, 0x0, 0x6c}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @jmp={0x5, 0x0, 0x8, 0x3, 0x4, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000001640)='syzkaller\x00', 0x80000001, 0x73, &(0x7f0000001680)=""/115, 0x41000, 0xa, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000001700)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001740)={0x0, 0x10, 0x400, 0x55e8}, 0x10}, 0x80) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) 03:48:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ff0000008d1f1000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x60d911187f0000}, 0x38) 03:48:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001800)={r0, 0xe0, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f00000006c0), &(0x7f0000001740), 0x8, 0x10, 0x8, 0x8, &(0x7f00000017c0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001840)={&(0x7f0000001b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd6, 0xd6, 0x3, [@const={0xe, 0x0, 0x0, 0xa, 0x4}, @volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @struct={0xa, 0x6, 0x0, 0x4, 0x1, 0xa03, [{0x6, 0x4, 0x4}, {0x5, 0x4, 0x680e053e}, {0x9, 0x0, 0xd13}, {0x7, 0x0, 0x6}, {0x8, 0x2, 0x80}, {0xa, 0x0, 0xb44}]}, @const, @var={0xa, 0x0, 0x0, 0xe, 0x4, 0x1}, @volatile={0x10, 0x0, 0x0, 0x9, 0x5}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @datasec={0x1, 0x2, 0x0, 0xf, 0x2, [{0x4, 0x4a3b, 0xfffffffe}, {0x2, 0x2, 0xff}], "ecad"}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x27, 0x0, 0x1f, 0x4}]}, {0x0, [0x30]}}, &(0x7f0000001a40)=""/159, 0xf3, 0x9f, 0x1}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e00)={0xffffffffffffffff, 0x20, &(0x7f0000001dc0)={&(0x7f0000001d00)=""/115, 0x73, 0x0, &(0x7f0000001d80)=""/5, 0x5}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e40)='pids.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ec0)={0x19, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3}, [@alu={0xb, 0x0, 0x5, 0x4, 0x3, 0xfffffffffffffffc, 0x1}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @alu={0x4, 0x1, 0xb, 0xb, 0xb, 0xab4f9adbb56602f9, 0xfffffffffffffffc}, @exit, @ldst={0x0, 0x3, 0x2, 0xb, 0x6, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x7fffffff, 0x5d, &(0x7f0000000640)=""/93, 0x1e00, 0x11, '\x00', r1, 0x8, r2, 0x8, &(0x7f0000001c80)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000001cc0)={0x3, 0xe, 0x4a, 0x7}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000001e80)=[r4, r0, 0xffffffffffffffff]}, 0x80) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbe, 0xbe, 0x6, [@datasec={0xd, 0x1, 0x0, 0xf, 0x2, [{0x2, 0xfffffffe, 0x1}], "c5e2"}, @fwd={0x8}, @volatile={0xd, 0x0, 0x0, 0x9, 0x4}, @func={0x5, 0x0, 0x0, 0xc, 0x1}, @struct={0xb, 0x3, 0x0, 0x4, 0x0, 0x7, [{0x3, 0x2, 0x6}, {0x8, 0x3, 0x95c}, {0xd, 0x0, 0x1}]}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x6, [{0x0, 0x2, 0x8000}]}, @union={0x1, 0x1, 0x0, 0x5, 0x0, 0x5, [{0x5, 0x3, 0xc1a}]}, @var={0xc, 0x0, 0x0, 0xe, 0x2, 0x1}, @var={0xa, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x30, 0x30, 0x61, 0x5f]}}, &(0x7f0000000140)=""/6, 0xde, 0x6, 0x1}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={0x0, 0x8, 0x10}, 0xc) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0xc}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x11, 0x1, 0x5, 0x9, 0x1, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x6}, @generic={0x2, 0x8, 0x1, 0x5, 0x7f}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f00000005c0)='GPL\x00', 0x5, 0x3b, &(0x7f0000000600)=""/59, 0x41100, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000640)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x7, 0x5daf854d}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r6, r7, r8, r9]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd4, 0xd4, 0x3, [@volatile={0xb}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x55, 0x0, 0x25, 0x4}, @func={0xd, 0x0, 0x0, 0xc, 0x4}, @var={0xa, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x10, 0x1}, {0x4, 0x4}, {0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0x1f}}, @union={0x9, 0x7, 0x0, 0x5, 0x0, 0x1, [{0x1, 0x1, 0xffff}, {0x6, 0x5, 0xfffffffe}, {0x10, 0x2, 0x8}, {0xc, 0x0, 0xffffffe0}, {0xf, 0x1, 0x80000001}, {0x2, 0x0, 0x7dbd}, {0x0, 0x1, 0x7ff}]}]}, {0x0, [0x61]}}, &(0x7f00000003c0)=""/198, 0xef, 0xc6}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x4fd, 0x6, 0x850, 0x1, 0x7, '\x00', 0x0, r10, 0x0, 0x0, 0x4000005, 0x5}, 0x48) [ 493.359200][T15968] FAULT_INJECTION: forcing a failure. [ 493.359200][T15968] name failslab, interval 1, probability 0, space 0, times 0 [ 493.402292][T15968] CPU: 0 PID: 15968 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 493.412369][T15968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 493.422262][T15968] Call Trace: [ 493.425390][T15968] [ 493.428166][T15968] dump_stack_lvl+0x151/0x1b7 [ 493.432681][T15968] ? bfq_pos_tree_add_move+0x43e/0x43e [ 493.437973][T15968] dump_stack+0x15/0x17 [ 493.441964][T15968] should_fail+0x3c0/0x510 [ 493.446219][T15968] __should_failslab+0x9f/0xe0 [ 493.450817][T15968] should_failslab+0x9/0x20 [ 493.455160][T15968] kmem_cache_alloc+0x4f/0x2f0 [ 493.459761][T15968] ? vm_area_dup+0x26/0x1d0 [ 493.464097][T15968] vm_area_dup+0x26/0x1d0 [ 493.468285][T15968] dup_mmap+0x6b8/0xea0 [ 493.472357][T15968] ? __delayed_free_task+0x20/0x20 [ 493.477287][T15968] ? mm_init+0x807/0x960 [ 493.481368][T15968] dup_mm+0x91/0x330 [ 493.485101][T15968] copy_mm+0x108/0x1b0 [ 493.489008][T15968] copy_process+0x1295/0x3250 [ 493.493521][T15968] ? proc_fail_nth_write+0x213/0x290 [ 493.498649][T15968] ? proc_fail_nth_read+0x220/0x220 [ 493.503702][T15968] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 493.508624][T15968] ? vfs_write+0x9af/0x1050 [ 493.512962][T15968] ? vmacache_update+0xb7/0x120 [ 493.517648][T15968] kernel_clone+0x22d/0x990 [ 493.521987][T15968] ? file_end_write+0x1b0/0x1b0 [ 493.526674][T15968] ? __kasan_check_write+0x14/0x20 [ 493.531632][T15968] ? create_io_thread+0x1e0/0x1e0 [ 493.536485][T15968] ? __mutex_lock_slowpath+0x10/0x10 [ 493.541609][T15968] __x64_sys_clone+0x289/0x310 [ 493.546207][T15968] ? __do_sys_vfork+0x130/0x130 [ 493.550893][T15968] ? debug_smp_processor_id+0x17/0x20 [ 493.556097][T15968] do_syscall_64+0x44/0xd0 [ 493.560348][T15968] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 493.566078][T15968] RIP: 0033:0x7f8ab3ee50d9 [ 493.570344][T15968] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 493.589773][T15968] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 493.598019][T15968] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 493.605916][T15968] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 493.613724][T15968] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 493.621533][T15968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 493.629352][T15968] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 493.637160][T15968] 03:48:29 executing program 4: syz_clone(0xc0800400, 0x0, 0x1b0e91f000, 0x0, 0x0, 0x0) 03:48:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x8c, 0x1, 0xfe, 0x8, 0x0, 0xffffffffffffffff, 0x8000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0xe5, 0xffffffff}, 0x88402, 0xfff, 0x1, 0x5, 0x4, 0x80000000, 0x9, 0x0, 0x1ff, 0x0, 0x2}, 0xffffffffffffffff, 0x6, r1, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x4, &(0x7f0000000080)='GPL\x00'}, 0x30) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x60f911187f0000}, 0x38) 03:48:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000fa590000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995eef7ed4af7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbe, 0xbe, 0x6, [@datasec={0xd, 0x1, 0x0, 0xf, 0x2, [{0x2, 0xfffffffe, 0x1}], "c5e2"}, @fwd={0x8}, @volatile={0xd, 0x0, 0x0, 0x9, 0x4}, @func={0x5, 0x0, 0x0, 0xc, 0x1}, @struct={0xb, 0x3, 0x0, 0x4, 0x0, 0x7, [{0x3, 0x2, 0x6}, {0x8, 0x3, 0x95c}, {0xd, 0x0, 0x1}]}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x6, [{0x0, 0x2, 0x8000}]}, @union={0x1, 0x1, 0x0, 0x5, 0x0, 0x5, [{0x5, 0x3, 0xc1a}]}, @var={0xc, 0x0, 0x0, 0xe, 0x2, 0x1}, @var={0xa, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x30, 0x30, 0x61, 0x5f]}}, &(0x7f0000000140)=""/6, 0xde, 0x6, 0x1}, 0x20) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={0x0, 0x8, 0x10}, 0xc) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0xc}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x11, 0x1, 0x5, 0x9, 0x1, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x6}, @generic={0x2, 0x8, 0x1, 0x5, 0x7f}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f00000005c0)='GPL\x00', 0x5, 0x3b, &(0x7f0000000600)=""/59, 0x41100, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000640)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x7, 0x5daf854d}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r6, r7, r8, r9]}, 0x80) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) (async) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd4, 0xd4, 0x3, [@volatile={0xb}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x55, 0x0, 0x25, 0x4}, @func={0xd, 0x0, 0x0, 0xc, 0x4}, @var={0xa, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x10, 0x1}, {0x4, 0x4}, {0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0x1f}}, @union={0x9, 0x7, 0x0, 0x5, 0x0, 0x1, [{0x1, 0x1, 0xffff}, {0x6, 0x5, 0xfffffffe}, {0x10, 0x2, 0x8}, {0xc, 0x0, 0xffffffe0}, {0xf, 0x1, 0x80000001}, {0x2, 0x0, 0x7dbd}, {0x0, 0x1, 0x7ff}]}]}, {0x0, [0x61]}}, &(0x7f00000003c0)=""/198, 0xef, 0xc6}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x4fd, 0x6, 0x850, 0x1, 0x7, '\x00', 0x0, r10, 0x0, 0x0, 0x4000005, 0x5}, 0x48) 03:48:29 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 53) 03:48:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xf0ff1f00000000}, 0x38) 03:48:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async, rerun: 32) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000fa590000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995eef7ed4af7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 493.917982][T15982] FAULT_INJECTION: forcing a failure. [ 493.917982][T15982] name failslab, interval 1, probability 0, space 0, times 0 [ 493.967462][T15982] CPU: 0 PID: 15982 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 493.977538][T15982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 493.987846][T15982] Call Trace: [ 493.990972][T15982] [ 493.993748][T15982] dump_stack_lvl+0x151/0x1b7 [ 493.998261][T15982] ? bfq_pos_tree_add_move+0x43e/0x43e [ 494.003820][T15982] dump_stack+0x15/0x17 [ 494.007808][T15982] should_fail+0x3c0/0x510 [ 494.012063][T15982] __should_failslab+0x9f/0xe0 03:48:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbe, 0xbe, 0x6, [@datasec={0xd, 0x1, 0x0, 0xf, 0x2, [{0x2, 0xfffffffe, 0x1}], "c5e2"}, @fwd={0x8}, @volatile={0xd, 0x0, 0x0, 0x9, 0x4}, @func={0x5, 0x0, 0x0, 0xc, 0x1}, @struct={0xb, 0x3, 0x0, 0x4, 0x0, 0x7, [{0x3, 0x2, 0x6}, {0x8, 0x3, 0x95c}, {0xd, 0x0, 0x1}]}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x6, [{0x0, 0x2, 0x8000}]}, @union={0x1, 0x1, 0x0, 0x5, 0x0, 0x5, [{0x5, 0x3, 0xc1a}]}, @var={0xc, 0x0, 0x0, 0xe, 0x2, 0x1}, @var={0xa, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x30, 0x30, 0x61, 0x5f]}}, &(0x7f0000000140)=""/6, 0xde, 0x6, 0x1}, 0x20) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={0x0, 0x8, 0x10}, 0xc) (async) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0xc}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x11, 0x1, 0x5, 0x9, 0x1, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x6}, @generic={0x2, 0x8, 0x1, 0x5, 0x7f}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f00000005c0)='GPL\x00', 0x5, 0x3b, &(0x7f0000000600)=""/59, 0x41100, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000640)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x7, 0x5daf854d}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r6, r7, r8, r9]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd4, 0xd4, 0x3, [@volatile={0xb}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x55, 0x0, 0x25, 0x4}, @func={0xd, 0x0, 0x0, 0xc, 0x4}, @var={0xa, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x10, 0x1}, {0x4, 0x4}, {0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0x1f}}, @union={0x9, 0x7, 0x0, 0x5, 0x0, 0x1, [{0x1, 0x1, 0xffff}, {0x6, 0x5, 0xfffffffe}, {0x10, 0x2, 0x8}, {0xc, 0x0, 0xffffffe0}, {0xf, 0x1, 0x80000001}, {0x2, 0x0, 0x7dbd}, {0x0, 0x1, 0x7ff}]}]}, {0x0, [0x61]}}, &(0x7f00000003c0)=""/198, 0xef, 0xc6}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x4fd, 0x6, 0x850, 0x1, 0x7, '\x00', 0x0, r10, 0x0, 0x0, 0x4000005, 0x5}, 0x48) [ 494.016665][T15982] should_failslab+0x9/0x20 [ 494.021003][T15982] kmem_cache_alloc+0x4f/0x2f0 [ 494.025602][T15982] ? vm_area_dup+0x26/0x1d0 [ 494.029944][T15982] vm_area_dup+0x26/0x1d0 [ 494.034114][T15982] dup_mmap+0x6b8/0xea0 [ 494.038100][T15982] ? __delayed_free_task+0x20/0x20 [ 494.043046][T15982] ? mm_init+0x807/0x960 [ 494.047126][T15982] dup_mm+0x91/0x330 [ 494.050861][T15982] copy_mm+0x108/0x1b0 [ 494.054765][T15982] copy_process+0x1295/0x3250 [ 494.059277][T15982] ? proc_fail_nth_write+0x213/0x290 [ 494.064396][T15982] ? proc_fail_nth_read+0x220/0x220 [ 494.069431][T15982] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 494.074390][T15982] ? vfs_write+0x9af/0x1050 [ 494.078716][T15982] ? vmacache_update+0xb7/0x120 [ 494.083411][T15982] kernel_clone+0x22d/0x990 [ 494.088147][T15982] ? file_end_write+0x1b0/0x1b0 [ 494.092834][T15982] ? __kasan_check_write+0x14/0x20 [ 494.097778][T15982] ? create_io_thread+0x1e0/0x1e0 [ 494.102638][T15982] ? __mutex_lock_slowpath+0x10/0x10 [ 494.107759][T15982] __x64_sys_clone+0x289/0x310 [ 494.112361][T15982] ? __do_sys_vfork+0x130/0x130 [ 494.117051][T15982] ? debug_smp_processor_id+0x17/0x20 [ 494.122256][T15982] do_syscall_64+0x44/0xd0 [ 494.126507][T15982] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 494.132237][T15982] RIP: 0033:0x7f8ab3ee50d9 [ 494.136493][T15982] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 494.155934][T15982] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:48:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x100000000000000}, 0x38) [ 494.164177][T15982] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 494.171994][T15982] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 494.179798][T15982] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 494.187612][T15982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 494.195422][T15982] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 494.203237][T15982] 03:48:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async, rerun: 32) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async, rerun: 64) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000fa590000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995eef7ed4af7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:29 executing program 1: close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:29 executing program 4: syz_clone(0xc0800400, 0x0, 0x29b8aee6e000, 0x0, 0x0, 0x0) 03:48:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x200000000000000}, 0x38) 03:48:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x8c, 0x1, 0xfe, 0x8, 0x0, 0xffffffffffffffff, 0x8000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0xe5, 0xffffffff}, 0x88402, 0xfff, 0x1, 0x5, 0x4, 0x80000000, 0x9, 0x0, 0x1ff, 0x0, 0x2}, 0xffffffffffffffff, 0x6, r1, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x4, &(0x7f0000000080)='GPL\x00'}, 0x30) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:29 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 54) 03:48:29 executing program 1: close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) close(0xffffffffffffffff) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) 03:48:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x6, 0x6, 0x5, 0x0, 0x1, 0x100, 0xf, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0x80000, 0x480000000000000, 0x80000001, 0x3, 0x8000000000000000, 0x2, 0x1, 0x0, 0x3, 0x0, 0xe5}, 0x0, 0x10, r1, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:29 executing program 1: close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) close(0xffffffffffffffff) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) 03:48:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x300000000000000}, 0x38) 03:48:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x8c, 0x1, 0xfe, 0x8, 0x0, 0xffffffffffffffff, 0x8000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0xe5, 0xffffffff}, 0x88402, 0xfff, 0x1, 0x5, 0x4, 0x80000000, 0x9, 0x0, 0x1ff, 0x0, 0x2}, 0xffffffffffffffff, 0x6, r1, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x4, &(0x7f0000000080)='GPL\x00'}, 0x30) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000067000000000000000000090000000000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6]}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000004c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0x0, 0x6, 0x18}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4}, [@jmp={0x5, 0x1, 0x8, 0xb, 0x2, 0x80, 0x4}, @jmp={0x5, 0x0, 0x5, 0x6, 0x8, 0x20, 0xffffffffffffffff}, @exit, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x100}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x10001, 0x42, &(0x7f0000000180)=""/66, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xc, 0x1000}, 0x10, 0x162de, r0, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff, 0x1, r1, r6, r2, r8, r12, r13]}, 0x80) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r14, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x6, 0x6, 0x5, 0x0, 0x1, 0x100, 0xf, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0x80000, 0x480000000000000, 0x80000001, 0x3, 0x8000000000000000, 0x2, 0x1, 0x0, 0x3, 0x0, 0xe5}, 0x0, 0x10, r1, 0x2) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async, rerun: 32) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x800000000000000}, 0x38) [ 494.503073][T16035] FAULT_INJECTION: forcing a failure. [ 494.503073][T16035] name failslab, interval 1, probability 0, space 0, times 0 [ 494.529612][T16035] CPU: 0 PID: 16035 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 494.539686][T16035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 494.549582][T16035] Call Trace: [ 494.552710][T16035] [ 494.555582][T16035] dump_stack_lvl+0x151/0x1b7 [ 494.560085][T16035] ? bfq_pos_tree_add_move+0x43e/0x43e [ 494.565377][T16035] dump_stack+0x15/0x17 [ 494.569371][T16035] should_fail+0x3c0/0x510 [ 494.573632][T16035] __should_failslab+0x9f/0xe0 [ 494.578225][T16035] should_failslab+0x9/0x20 [ 494.582571][T16035] kmem_cache_alloc+0x4f/0x2f0 [ 494.587160][T16035] ? vm_area_dup+0x26/0x1d0 [ 494.591500][T16035] vm_area_dup+0x26/0x1d0 [ 494.595668][T16035] dup_mmap+0x6b8/0xea0 [ 494.599661][T16035] ? __delayed_free_task+0x20/0x20 [ 494.604622][T16035] ? mm_init+0x807/0x960 [ 494.608687][T16035] dup_mm+0x91/0x330 [ 494.612416][T16035] copy_mm+0x108/0x1b0 [ 494.616322][T16035] copy_process+0x1295/0x3250 [ 494.620847][T16035] ? proc_fail_nth_write+0x213/0x290 [ 494.626051][T16035] ? proc_fail_nth_read+0x220/0x220 [ 494.631078][T16035] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 494.636034][T16035] ? vfs_write+0x9af/0x1050 [ 494.640365][T16035] ? vmacache_update+0xb7/0x120 [ 494.645053][T16035] kernel_clone+0x22d/0x990 [ 494.649390][T16035] ? file_end_write+0x1b0/0x1b0 [ 494.654079][T16035] ? __kasan_check_write+0x14/0x20 [ 494.659025][T16035] ? create_io_thread+0x1e0/0x1e0 [ 494.663885][T16035] ? __mutex_lock_slowpath+0x10/0x10 [ 494.669009][T16035] __x64_sys_clone+0x289/0x310 [ 494.673624][T16035] ? __do_sys_vfork+0x130/0x130 [ 494.678296][T16035] ? debug_smp_processor_id+0x17/0x20 [ 494.683528][T16035] do_syscall_64+0x44/0xd0 [ 494.687754][T16035] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 494.693483][T16035] RIP: 0033:0x7f8ab3ee50d9 [ 494.697738][T16035] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 494.717374][T16035] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 494.725612][T16035] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 494.733422][T16035] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 494.741241][T16035] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 03:48:30 executing program 4: syz_clone(0xc0800400, 0x0, 0x553a25ecc000, 0x0, 0x0, 0x0) 03:48:30 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) r7 = openat$cgroup_ro(r5, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r4, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r10, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r11, 0x0, r10, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x4004662b, &(0x7f00000005c0)=0x1) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r13, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r13, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r13, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r10, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r12, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, r9, 0xffffffffffffffff, r13]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000001b00)=0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a80)={0x11, 0x2, &(0x7f0000000180)=@raw=[@map_fd={0x18, 0x6, 0x1, 0x0, r7}], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000009c0)=""/4096, 0x41000, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000019c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000001a00)={0x5, 0xd, 0x8000000, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a40)=[r6, r1, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r6]}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='\x00') syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xf00000000000000}, 0x38) [ 494.749047][T16035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 494.756861][T16035] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 494.764673][T16035] 03:48:30 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 55) 03:48:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x6, 0x6, 0x5, 0x0, 0x1, 0x100, 0xf, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0x80000, 0x480000000000000, 0x80000001, 0x3, 0x8000000000000000, 0x2, 0x1, 0x0, 0x3, 0x0, 0xe5}, 0x0, 0x10, r1, 0x2) (async, rerun: 64) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async, rerun: 64) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000067000000000000000000090000000000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6]}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) (rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000004c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0x0, 0x6, 0x18}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4}, [@jmp={0x5, 0x1, 0x8, 0xb, 0x2, 0x80, 0x4}, @jmp={0x5, 0x0, 0x5, 0x6, 0x8, 0x20, 0xffffffffffffffff}, @exit, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x100}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x10001, 0x42, &(0x7f0000000180)=""/66, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xc, 0x1000}, 0x10, 0x162de, r0, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff, 0x1, r1, r6, r2, r8, r12, r13]}, 0x80) (async) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r14, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x1000000000000000}, 0x38) [ 494.827274][T16068] FAULT_INJECTION: forcing a failure. [ 494.827274][T16068] name failslab, interval 1, probability 0, space 0, times 0 [ 494.847219][T16068] CPU: 0 PID: 16068 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 494.857294][T16068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 494.867189][T16068] Call Trace: [ 494.870316][T16068] [ 494.873092][T16068] dump_stack_lvl+0x151/0x1b7 [ 494.877605][T16068] ? bfq_pos_tree_add_move+0x43e/0x43e [ 494.882901][T16068] dump_stack+0x15/0x17 [ 494.886892][T16068] should_fail+0x3c0/0x510 [ 494.891228][T16068] __should_failslab+0x9f/0xe0 [ 494.895840][T16068] should_failslab+0x9/0x20 [ 494.900188][T16068] kmem_cache_alloc+0x4f/0x2f0 [ 494.904780][T16068] ? vm_area_dup+0x26/0x1d0 [ 494.909169][T16068] vm_area_dup+0x26/0x1d0 [ 494.913287][T16068] dup_mmap+0x6b8/0xea0 [ 494.917281][T16068] ? __delayed_free_task+0x20/0x20 [ 494.922224][T16068] ? mm_init+0x807/0x960 [ 494.926304][T16068] dup_mm+0x91/0x330 [ 494.930126][T16068] copy_mm+0x108/0x1b0 [ 494.934035][T16068] copy_process+0x1295/0x3250 [ 494.938542][T16068] ? proc_fail_nth_write+0x213/0x290 [ 494.943667][T16068] ? proc_fail_nth_read+0x220/0x220 [ 494.948698][T16068] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 494.953649][T16068] ? vfs_write+0x9af/0x1050 [ 494.957982][T16068] ? vmacache_update+0xb7/0x120 [ 494.962799][T16068] kernel_clone+0x22d/0x990 [ 494.967097][T16068] ? file_end_write+0x1b0/0x1b0 [ 494.971783][T16068] ? __kasan_check_write+0x14/0x20 [ 494.976730][T16068] ? create_io_thread+0x1e0/0x1e0 [ 494.981591][T16068] ? __mutex_lock_slowpath+0x10/0x10 [ 494.986802][T16068] __x64_sys_clone+0x289/0x310 [ 494.991402][T16068] ? __do_sys_vfork+0x130/0x130 [ 494.996175][T16068] ? debug_smp_processor_id+0x17/0x20 [ 495.001380][T16068] do_syscall_64+0x44/0xd0 [ 495.005632][T16068] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 495.011450][T16068] RIP: 0033:0x7f8ab3ee50d9 [ 495.015705][T16068] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 495.035145][T16068] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 495.043389][T16068] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 495.051200][T16068] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 495.059010][T16068] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 495.066824][T16068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:48:30 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) r7 = openat$cgroup_ro(r5, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r4, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r10, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r11, 0x0, r10, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r13, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r13, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 32) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r13, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r10, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r12, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, r9, 0xffffffffffffffff, r13]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000001b00)=0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a80)={0x11, 0x2, &(0x7f0000000180)=@raw=[@map_fd={0x18, 0x6, 0x1, 0x0, r7}], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000009c0)=""/4096, 0x41000, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000019c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000001a00)={0x5, 0xd, 0x8000000, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a40)=[r6, r1, r6]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r6]}, 0x80) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='\x00') (rerun: 32) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000067000000000000000000090000000000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6]}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async, rerun: 32) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000004c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) (async) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) (async) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0x0, 0x6, 0x18}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4}, [@jmp={0x5, 0x1, 0x8, 0xb, 0x2, 0x80, 0x4}, @jmp={0x5, 0x0, 0x5, 0x6, 0x8, 0x20, 0xffffffffffffffff}, @exit, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x100}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x10001, 0x42, &(0x7f0000000180)=""/66, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xc, 0x1000}, 0x10, 0x162de, r0, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff, 0x1, r1, r6, r2, r8, r12, r13]}, 0x80) (async) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r14, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) r3 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x2, 0x20, 0x8f, 0x1, 0x0, 0x9, 0x90022, 0x1c, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xac6, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x9200, 0xdef9, 0x18, 0x6, 0x1a, 0x1, 0x8, 0x0, 0x10000, 0x0, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000100)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x2000000000000000}, 0x38) 03:48:30 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 56) [ 495.074634][T16068] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 495.082537][T16068] 03:48:30 executing program 4: syz_clone(0xc0800400, 0x0, 0x2001000000000, 0x0, 0x0, 0x0) 03:48:30 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r2, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r2, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r6, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r9]}, 0x80) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0xc737bb94e62da314}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0xfffffffa, 0x1713, 0x0, 0x1100, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x9, &(0x7f0000000000)=@raw=[@exit, @exit, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x2}, @alu={0x7, 0x1, 0xa, 0x5, 0x0, 0xfffffffffffffffc, 0x10}, @ldst={0x2, 0x0, 0x0, 0x3, 0x6, 0x40, 0x9}, @map_fd={0x18, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0xe3, &(0x7f0000000100)=""/227, 0x41100, 0xc, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x2, 0xffffffff, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x1, r5, r10, 0x1, r11, 0x1, 0x1, 0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xf2ffffff00000000}, 0x38) [ 495.159256][T16097] FAULT_INJECTION: forcing a failure. [ 495.159256][T16097] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 495.189121][T16097] CPU: 0 PID: 16097 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 495.199193][T16097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 495.209087][T16097] Call Trace: [ 495.212208][T16097] [ 495.214988][T16097] dump_stack_lvl+0x151/0x1b7 [ 495.219502][T16097] ? bfq_pos_tree_add_move+0x43e/0x43e [ 495.224804][T16097] ? __switch_to+0x617/0x1170 [ 495.229309][T16097] ? __kasan_check_read+0x11/0x20 [ 495.234174][T16097] dump_stack+0x15/0x17 [ 495.238163][T16097] should_fail+0x3c0/0x510 [ 495.242415][T16097] should_fail_alloc_page+0x58/0x70 [ 495.247450][T16097] __alloc_pages+0x1de/0x7c0 [ 495.251879][T16097] ? __count_vm_events+0x30/0x30 [ 495.256652][T16097] ? __this_cpu_preempt_check+0x13/0x20 [ 495.262033][T16097] pte_alloc_one+0x73/0x1b0 [ 495.266372][T16097] ? pfn_modify_allowed+0x2e0/0x2e0 [ 495.271406][T16097] ? preempt_schedule+0xd9/0xe0 [ 495.276148][T16097] ? preempt_schedule_common+0xcb/0x100 [ 495.281474][T16097] __pte_alloc+0x86/0x350 [ 495.285637][T16097] ? irqentry_exit+0x30/0x40 [ 495.290062][T16097] ? sysvec_call_function_single+0x55/0xc0 [ 495.295702][T16097] ? free_pgtables+0x210/0x210 [ 495.300307][T16097] copy_pte_range+0x1b1f/0x20b0 [ 495.305001][T16097] ? __kunmap_atomic+0x80/0x80 [ 495.309591][T16097] ? __kasan_slab_alloc+0xc4/0xe0 [ 495.314448][T16097] ? __kasan_slab_alloc+0xb2/0xe0 [ 495.319309][T16097] ? kmem_cache_alloc+0x189/0x2f0 [ 495.324169][T16097] ? vm_area_dup+0x26/0x1d0 [ 495.328512][T16097] ? dup_mmap+0x6b8/0xea0 [ 495.332675][T16097] ? dup_mm+0x91/0x330 [ 495.336581][T16097] ? copy_mm+0x108/0x1b0 [ 495.340660][T16097] ? copy_process+0x1295/0x3250 [ 495.345348][T16097] ? kernel_clone+0x22d/0x990 [ 495.349946][T16097] ? __x64_sys_clone+0x289/0x310 [ 495.354723][T16097] ? do_syscall_64+0x44/0xd0 [ 495.359146][T16097] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 495.365059][T16097] copy_page_range+0xc1e/0x1090 [ 495.369739][T16097] ? pfn_valid+0x1e0/0x1e0 [ 495.373990][T16097] dup_mmap+0x99f/0xea0 [ 495.377986][T16097] ? __delayed_free_task+0x20/0x20 [ 495.382930][T16097] ? mm_init+0x807/0x960 [ 495.387009][T16097] dup_mm+0x91/0x330 [ 495.390739][T16097] copy_mm+0x108/0x1b0 [ 495.394646][T16097] copy_process+0x1295/0x3250 [ 495.399161][T16097] ? proc_fail_nth_write+0x213/0x290 [ 495.404281][T16097] ? proc_fail_nth_read+0x220/0x220 [ 495.409314][T16097] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 495.414263][T16097] ? vfs_write+0x9af/0x1050 [ 495.418602][T16097] ? vmacache_update+0xb7/0x120 [ 495.423287][T16097] kernel_clone+0x22d/0x990 [ 495.427627][T16097] ? file_end_write+0x1b0/0x1b0 [ 495.432316][T16097] ? __kasan_check_write+0x14/0x20 [ 495.437282][T16097] ? create_io_thread+0x1e0/0x1e0 [ 495.442122][T16097] ? __mutex_lock_slowpath+0x10/0x10 [ 495.447246][T16097] __x64_sys_clone+0x289/0x310 [ 495.451845][T16097] ? __do_sys_vfork+0x130/0x130 [ 495.456539][T16097] ? debug_smp_processor_id+0x17/0x20 [ 495.461738][T16097] do_syscall_64+0x44/0xd0 [ 495.465993][T16097] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 495.471720][T16097] RIP: 0033:0x7f8ab3ee50d9 [ 495.475973][T16097] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 495.495500][T16097] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 495.503748][T16097] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 03:48:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r3 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x2, 0x20, 0x8f, 0x1, 0x0, 0x9, 0x90022, 0x1c, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xac6, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x9200, 0xdef9, 0x18, 0x6, 0x1a, 0x1, 0x8, 0x0, 0x10000, 0x0, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000100)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:31 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 57) 03:48:31 executing program 4: syz_clone(0xc0800400, 0x0, 0x2020000000000, 0x0, 0x0, 0x0) [ 495.511556][T16097] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 495.519367][T16097] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 495.527179][T16097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 495.534994][T16097] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 495.542808][T16097] 03:48:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xfeffffff00000000}, 0x38) 03:48:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) r7 = openat$cgroup_ro(r5, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r4, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r10, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r11, 0x0, r10, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r13, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r13, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r13, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r10, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r12, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, r9, 0xffffffffffffffff, r13]}, 0x80) (async) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000001b00)=0x4) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a80)={0x11, 0x2, &(0x7f0000000180)=@raw=[@map_fd={0x18, 0x6, 0x1, 0x0, r7}], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000009c0)=""/4096, 0x41000, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000019c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000001a00)={0x5, 0xd, 0x8000000, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a40)=[r6, r1, r6]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r6]}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='\x00') syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:31 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r2, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r2, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) (async, rerun: 32) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r6, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r9]}, 0x80) (async, rerun: 32) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0xc737bb94e62da314}, 0x10) (async, rerun: 32) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0xfffffffa, 0x1713, 0x0, 0x1100, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x9, &(0x7f0000000000)=@raw=[@exit, @exit, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x2}, @alu={0x7, 0x1, 0xa, 0x5, 0x0, 0xfffffffffffffffc, 0x10}, @ldst={0x2, 0x0, 0x0, 0x3, 0x6, 0x40, 0x9}, @map_fd={0x18, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0xe3, &(0x7f0000000100)=""/227, 0x41100, 0xc, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x2, 0xffffffff, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x1, r5, r10, 0x1, r11, 0x1, 0x1, 0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) [ 495.633365][T16120] FAULT_INJECTION: forcing a failure. [ 495.633365][T16120] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 495.661559][T16120] CPU: 1 PID: 16120 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 495.671614][T16120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 495.681599][T16120] Call Trace: [ 495.684739][T16120] [ 495.687494][T16120] dump_stack_lvl+0x151/0x1b7 [ 495.692015][T16120] ? bfq_pos_tree_add_move+0x43e/0x43e [ 495.697303][T16120] dump_stack+0x15/0x17 [ 495.701303][T16120] should_fail+0x3c0/0x510 [ 495.705556][T16120] should_fail_alloc_page+0x58/0x70 [ 495.710581][T16120] __alloc_pages+0x1de/0x7c0 [ 495.715270][T16120] ? __count_vm_events+0x30/0x30 [ 495.720047][T16120] ? __this_cpu_preempt_check+0x13/0x20 [ 495.725422][T16120] ? __mod_node_page_state+0xac/0xf0 [ 495.730551][T16120] pte_alloc_one+0x73/0x1b0 [ 495.734889][T16120] ? pfn_modify_allowed+0x2e0/0x2e0 [ 495.739918][T16120] __pte_alloc+0x86/0x350 [ 495.744086][T16120] ? free_pgtables+0x210/0x210 [ 495.748687][T16120] ? _raw_spin_lock+0xa3/0x1b0 [ 495.753293][T16120] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 495.758495][T16120] ? __kernel_text_address+0x9a/0x110 [ 495.763700][T16120] copy_pte_range+0x1b1f/0x20b0 [ 495.768474][T16120] ? __kunmap_atomic+0x80/0x80 [ 495.773072][T16120] ? __kasan_slab_alloc+0xc4/0xe0 [ 495.777940][T16120] ? __kasan_slab_alloc+0xb2/0xe0 [ 495.782794][T16120] ? kmem_cache_alloc+0x189/0x2f0 [ 495.787653][T16120] ? vm_area_dup+0x26/0x1d0 [ 495.791991][T16120] ? dup_mmap+0x6b8/0xea0 [ 495.796159][T16120] ? dup_mm+0x91/0x330 [ 495.800065][T16120] ? copy_mm+0x108/0x1b0 [ 495.804142][T16120] ? copy_process+0x1295/0x3250 [ 495.808829][T16120] ? kernel_clone+0x22d/0x990 [ 495.813433][T16120] ? __x64_sys_clone+0x289/0x310 [ 495.818210][T16120] ? do_syscall_64+0x44/0xd0 [ 495.822630][T16120] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 495.828534][T16120] copy_page_range+0xc1e/0x1090 [ 495.833222][T16120] ? pfn_valid+0x1e0/0x1e0 [ 495.837476][T16120] dup_mmap+0x99f/0xea0 [ 495.841465][T16120] ? __delayed_free_task+0x20/0x20 [ 495.846447][T16120] ? mm_init+0x807/0x960 [ 495.850496][T16120] dup_mm+0x91/0x330 [ 495.854227][T16120] copy_mm+0x108/0x1b0 [ 495.858136][T16120] copy_process+0x1295/0x3250 [ 495.862646][T16120] ? proc_fail_nth_write+0x213/0x290 [ 495.867763][T16120] ? proc_fail_nth_read+0x220/0x220 [ 495.872798][T16120] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 495.878005][T16120] ? vfs_write+0x9af/0x1050 [ 495.882344][T16120] ? vmacache_update+0xb7/0x120 [ 495.887041][T16120] kernel_clone+0x22d/0x990 [ 495.891393][T16120] ? file_end_write+0x1b0/0x1b0 [ 495.896056][T16120] ? __kasan_check_write+0x14/0x20 [ 495.901004][T16120] ? create_io_thread+0x1e0/0x1e0 [ 495.905865][T16120] ? __mutex_lock_slowpath+0x10/0x10 [ 495.910989][T16120] __x64_sys_clone+0x289/0x310 [ 495.915594][T16120] ? __do_sys_vfork+0x130/0x130 [ 495.920275][T16120] ? debug_smp_processor_id+0x17/0x20 [ 495.925487][T16120] do_syscall_64+0x44/0xd0 [ 495.929750][T16120] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 495.935464][T16120] RIP: 0033:0x7f8ab3ee50d9 [ 495.939719][T16120] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 495.959339][T16120] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 495.968839][T16120] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 495.976606][T16120] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 03:48:31 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 58) 03:48:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) r3 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x2, 0x20, 0x8f, 0x1, 0x0, 0x9, 0x90022, 0x1c, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xac6, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x9200, 0xdef9, 0x18, 0x6, 0x1a, 0x1, 0x8, 0x0, 0x10000, 0x0, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000100)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x2, 0x20, 0x8f, 0x1, 0x0, 0x9, 0x90022, 0x1c, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xac6, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x9200, 0xdef9, 0x18, 0x6, 0x1a, 0x1, 0x8, 0x0, 0x10000, 0x0, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000100)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) 03:48:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xffffffffa0024000}, 0x38) 03:48:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYRESDEC=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 495.984420][T16120] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 495.992226][T16120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 496.000036][T16120] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 496.007850][T16120] [ 496.069782][T16136] FAULT_INJECTION: forcing a failure. [ 496.069782][T16136] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 496.083841][T16136] CPU: 0 PID: 16136 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 496.093912][T16136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 496.103834][T16136] Call Trace: [ 496.106932][T16136] [ 496.109709][T16136] dump_stack_lvl+0x151/0x1b7 [ 496.114222][T16136] ? bfq_pos_tree_add_move+0x43e/0x43e [ 496.119524][T16136] dump_stack+0x15/0x17 [ 496.123518][T16136] should_fail+0x3c0/0x510 [ 496.127764][T16136] should_fail_alloc_page+0x58/0x70 [ 496.132798][T16136] __alloc_pages+0x1de/0x7c0 [ 496.137237][T16136] ? __count_vm_events+0x30/0x30 [ 496.142002][T16136] ? __this_cpu_preempt_check+0x13/0x20 [ 496.147480][T16136] ? __mod_node_page_state+0xac/0xf0 [ 496.152588][T16136] pte_alloc_one+0x73/0x1b0 [ 496.156927][T16136] ? pfn_modify_allowed+0x2e0/0x2e0 [ 496.161964][T16136] __pte_alloc+0x86/0x350 [ 496.166131][T16136] ? free_pgtables+0x210/0x210 [ 496.170729][T16136] ? _raw_spin_lock+0xa3/0x1b0 [ 496.175328][T16136] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 496.180537][T16136] ? __kernel_text_address+0x9a/0x110 [ 496.185742][T16136] copy_pte_range+0x1b1f/0x20b0 [ 496.190445][T16136] ? __kunmap_atomic+0x80/0x80 [ 496.195034][T16136] ? __kasan_slab_alloc+0xc4/0xe0 [ 496.199889][T16136] ? __kasan_slab_alloc+0xb2/0xe0 [ 496.204750][T16136] ? kmem_cache_alloc+0x189/0x2f0 [ 496.209615][T16136] ? vm_area_dup+0x26/0x1d0 [ 496.213949][T16136] ? dup_mmap+0x6b8/0xea0 [ 496.218122][T16136] ? dup_mm+0x91/0x330 [ 496.222020][T16136] ? copy_mm+0x108/0x1b0 [ 496.226104][T16136] ? copy_process+0x1295/0x3250 [ 496.230791][T16136] ? kernel_clone+0x22d/0x990 [ 496.235304][T16136] ? __x64_sys_clone+0x289/0x310 [ 496.240075][T16136] ? do_syscall_64+0x44/0xd0 [ 496.244508][T16136] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 496.250410][T16136] copy_page_range+0xc1e/0x1090 [ 496.255099][T16136] ? pfn_valid+0x1e0/0x1e0 [ 496.259346][T16136] dup_mmap+0x99f/0xea0 [ 496.263337][T16136] ? __delayed_free_task+0x20/0x20 [ 496.268288][T16136] ? mm_init+0x807/0x960 [ 496.272363][T16136] dup_mm+0x91/0x330 [ 496.276094][T16136] copy_mm+0x108/0x1b0 [ 496.280005][T16136] copy_process+0x1295/0x3250 [ 496.284538][T16136] ? proc_fail_nth_write+0x213/0x290 [ 496.289633][T16136] ? proc_fail_nth_read+0x220/0x220 [ 496.294671][T16136] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 496.299613][T16136] ? vfs_write+0x9af/0x1050 [ 496.303956][T16136] ? vmacache_update+0xb7/0x120 [ 496.308656][T16136] kernel_clone+0x22d/0x990 [ 496.312986][T16136] ? file_end_write+0x1b0/0x1b0 [ 496.317668][T16136] ? __kasan_check_write+0x14/0x20 [ 496.322618][T16136] ? create_io_thread+0x1e0/0x1e0 [ 496.327479][T16136] ? __mutex_lock_slowpath+0x10/0x10 [ 496.332600][T16136] __x64_sys_clone+0x289/0x310 [ 496.337203][T16136] ? __do_sys_vfork+0x130/0x130 [ 496.341888][T16136] ? debug_smp_processor_id+0x17/0x20 [ 496.347095][T16136] do_syscall_64+0x44/0xd0 [ 496.351345][T16136] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 496.357073][T16136] RIP: 0033:0x7f8ab3ee50d9 [ 496.361328][T16136] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 496.380768][T16136] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 496.389013][T16136] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 496.396826][T16136] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 496.404634][T16136] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 496.412446][T16136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:48:31 executing program 4: syz_clone(0xc0800400, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) 03:48:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0xffffffffff600000}, 0x38) 03:48:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x2}, 0x38) 03:48:31 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r2, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r2, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r6, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r6, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff, r9]}, 0x80) (async) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0xc737bb94e62da314}, 0x10) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0xfffffffa, 0x1713, 0x0, 0x1100, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x9, &(0x7f0000000000)=@raw=[@exit, @exit, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x2}, @alu={0x7, 0x1, 0xa, 0x5, 0x0, 0xfffffffffffffffc, 0x10}, @ldst={0x2, 0x0, 0x0, 0x3, 0x6, 0x40, 0x9}, @map_fd={0x18, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0xe3, &(0x7f0000000100)=""/227, 0x41100, 0xc, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x2, 0xffffffff, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x1, r5, r10, 0x1, r11, 0x1, 0x1, 0x1]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x80, 0x19be1038, 0x800, 0x1, r6, 0xf93d, '\x00', r1, 0xffffffffffffffff, 0x3, 0x0, 0x2, 0x6}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:31 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 59) 03:48:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x3}, 0x38) 03:48:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYRESDEC=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 496.420259][T16136] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 496.428074][T16136] 03:48:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) r2 = perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x3, 0x0, 0xaf, 0xfd, 0x0, 0x3, 0x11010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x377, 0x0, @perf_config_ext={0xa7, 0x5}, 0x81, 0xffffffffffffffff, 0x3, 0x8, 0x7ff, 0x1ff, 0xa8, 0x0, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r0, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x80, 0x0, 0x9, 0x1f, 0x0, 0x4, 0x8000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x6}, 0x900c8, 0x8000000000000000, 0xaf3, 0x0, 0x5, 0x64d, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0, 0xd, r2, 0x2) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x1, 0x3f, 0xd8, 0x6, 0x0, 0x2, 0x1000, 0xb2a25c5683f3114d, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0xd}, 0x0, 0xdf7d, 0x800000, 0x1, 0xe22, 0xfff, 0x0, 0x0, 0x6, 0x0, 0x5}, 0xffffffffffffffff, 0x3, r4, 0x1) 03:48:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x8}, 0x38) 03:48:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 32) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 32) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x80, 0x19be1038, 0x800, 0x1, r6, 0xf93d, '\x00', r1, 0xffffffffffffffff, 0x3, 0x0, 0x2, 0x6}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xf}, 0x38) [ 496.559833][T16193] FAULT_INJECTION: forcing a failure. [ 496.559833][T16193] name failslab, interval 1, probability 0, space 0, times 0 [ 496.589722][T16193] CPU: 0 PID: 16193 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 496.599791][T16193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 496.609682][T16193] Call Trace: [ 496.612831][T16193] [ 496.615592][T16193] dump_stack_lvl+0x151/0x1b7 [ 496.620097][T16193] ? bfq_pos_tree_add_move+0x43e/0x43e [ 496.625393][T16193] dump_stack+0x15/0x17 [ 496.629388][T16193] should_fail+0x3c0/0x510 [ 496.633639][T16193] __should_failslab+0x9f/0xe0 [ 496.638326][T16193] should_failslab+0x9/0x20 [ 496.642662][T16193] kmem_cache_alloc+0x4f/0x2f0 [ 496.647263][T16193] ? vm_area_dup+0x26/0x1d0 [ 496.651602][T16193] vm_area_dup+0x26/0x1d0 [ 496.655773][T16193] dup_mmap+0x6b8/0xea0 [ 496.659766][T16193] ? __delayed_free_task+0x20/0x20 [ 496.664712][T16193] ? mm_init+0x807/0x960 [ 496.668791][T16193] dup_mm+0x91/0x330 [ 496.672521][T16193] copy_mm+0x108/0x1b0 [ 496.676430][T16193] copy_process+0x1295/0x3250 [ 496.680955][T16193] ? proc_fail_nth_write+0x213/0x290 [ 496.686061][T16193] ? proc_fail_nth_read+0x220/0x220 [ 496.691099][T16193] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 496.696042][T16193] ? vfs_write+0x9af/0x1050 [ 496.700382][T16193] ? vmacache_update+0xb7/0x120 [ 496.705067][T16193] kernel_clone+0x22d/0x990 [ 496.709406][T16193] ? file_end_write+0x1b0/0x1b0 [ 496.714091][T16193] ? __kasan_check_write+0x14/0x20 [ 496.719048][T16193] ? create_io_thread+0x1e0/0x1e0 [ 496.723903][T16193] ? __mutex_lock_slowpath+0x10/0x10 [ 496.729023][T16193] __x64_sys_clone+0x289/0x310 [ 496.733626][T16193] ? __do_sys_vfork+0x130/0x130 [ 496.738310][T16193] ? debug_smp_processor_id+0x17/0x20 [ 496.743522][T16193] do_syscall_64+0x44/0xd0 [ 496.747770][T16193] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 496.753500][T16193] RIP: 0033:0x7f8ab3ee50d9 [ 496.757753][T16193] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 496.777200][T16193] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 496.785438][T16193] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 496.793249][T16193] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 496.801068][T16193] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 496.808876][T16193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 496.816772][T16193] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 496.824597][T16193] 03:48:32 executing program 4: syz_clone(0xc0800400, 0x0, 0x10000000000000, 0x0, 0x0, 0x0) 03:48:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) r2 = perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x3, 0x0, 0xaf, 0xfd, 0x0, 0x3, 0x11010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x377, 0x0, @perf_config_ext={0xa7, 0x5}, 0x81, 0xffffffffffffffff, 0x3, 0x8, 0x7ff, 0x1ff, 0xa8, 0x0, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r0, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x80, 0x0, 0x9, 0x1f, 0x0, 0x4, 0x8000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x6}, 0x900c8, 0x8000000000000000, 0xaf3, 0x0, 0x5, 0x64d, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0, 0xd, r2, 0x2) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) (async) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x1, 0x3f, 0xd8, 0x6, 0x0, 0x2, 0x1000, 0xb2a25c5683f3114d, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0xd}, 0x0, 0xdf7d, 0x800000, 0x1, 0xe22, 0xfff, 0x0, 0x0, 0x6, 0x0, 0x5}, 0xffffffffffffffff, 0x3, r4, 0x1) 03:48:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x10}, 0x38) 03:48:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (rerun: 64) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async, rerun: 64) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x80, 0x19be1038, 0x800, 0x1, r6, 0xf93d, '\x00', r1, 0xffffffffffffffff, 0x3, 0x0, 0x2, 0x6}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYRESDEC=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYRESDEC=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 03:48:32 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 60) 03:48:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x21}, 0x38) 03:48:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) r2 = perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x3, 0x0, 0xaf, 0xfd, 0x0, 0x3, 0x11010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x377, 0x0, @perf_config_ext={0xa7, 0x5}, 0x81, 0xffffffffffffffff, 0x3, 0x8, 0x7ff, 0x1ff, 0xa8, 0x0, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r0, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x80, 0x0, 0x9, 0x1f, 0x0, 0x4, 0x8000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x6}, 0x900c8, 0x8000000000000000, 0xaf3, 0x0, 0x5, 0x64d, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0, 0xd, r2, 0x2) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x1, 0x3f, 0xd8, 0x6, 0x0, 0x2, 0x1000, 0xb2a25c5683f3114d, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0xd}, 0x0, 0xdf7d, 0x800000, 0x1, 0xe22, 0xfff, 0x0, 0x0, 0x6, 0x0, 0x5}, 0xffffffffffffffff, 0x3, r4, 0x1) 03:48:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x300}, 0x38) [ 497.007923][T16232] FAULT_INJECTION: forcing a failure. [ 497.007923][T16232] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 497.021044][T16232] CPU: 0 PID: 16232 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 497.031014][T16232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 497.040910][T16232] Call Trace: [ 497.044039][T16232] [ 497.046810][T16232] dump_stack_lvl+0x151/0x1b7 [ 497.051324][T16232] ? bfq_pos_tree_add_move+0x43e/0x43e [ 497.056620][T16232] dump_stack+0x15/0x17 [ 497.060610][T16232] should_fail+0x3c0/0x510 [ 497.064868][T16232] should_fail_alloc_page+0x58/0x70 [ 497.069898][T16232] __alloc_pages+0x1de/0x7c0 [ 497.074337][T16232] ? __count_vm_events+0x30/0x30 [ 497.079098][T16232] ? __this_cpu_preempt_check+0x13/0x20 [ 497.084477][T16232] ? __mod_node_page_state+0xac/0xf0 [ 497.089603][T16232] pte_alloc_one+0x73/0x1b0 [ 497.093940][T16232] ? pfn_modify_allowed+0x2e0/0x2e0 [ 497.098978][T16232] __pte_alloc+0x86/0x350 [ 497.103149][T16232] ? free_pgtables+0x210/0x210 [ 497.107743][T16232] ? copy_pte_range+0xbf3/0x20b0 [ 497.112514][T16232] ? copy_pte_range+0xc7a/0x20b0 [ 497.117287][T16232] copy_pte_range+0x1b1f/0x20b0 [ 497.121987][T16232] ? __kunmap_atomic+0x80/0x80 [ 497.126576][T16232] ? __kasan_slab_alloc+0xc4/0xe0 [ 497.131434][T16232] ? __kasan_slab_alloc+0xb2/0xe0 [ 497.136293][T16232] ? kmem_cache_alloc+0x189/0x2f0 [ 497.141338][T16232] ? vm_area_dup+0x26/0x1d0 [ 497.145668][T16232] ? dup_mmap+0x6b8/0xea0 [ 497.149834][T16232] ? dup_mm+0x91/0x330 [ 497.153824][T16232] ? copy_mm+0x108/0x1b0 [ 497.157905][T16232] ? copy_process+0x1295/0x3250 [ 497.162593][T16232] ? kernel_clone+0x22d/0x990 [ 497.167104][T16232] ? __x64_sys_clone+0x289/0x310 [ 497.171882][T16232] ? do_syscall_64+0x44/0xd0 [ 497.176304][T16232] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 497.182216][T16232] copy_page_range+0xc1e/0x1090 [ 497.186899][T16232] ? pfn_valid+0x1e0/0x1e0 [ 497.191158][T16232] dup_mmap+0x99f/0xea0 [ 497.195141][T16232] ? __delayed_free_task+0x20/0x20 [ 497.200087][T16232] ? mm_init+0x807/0x960 [ 497.204169][T16232] dup_mm+0x91/0x330 [ 497.207899][T16232] copy_mm+0x108/0x1b0 [ 497.211814][T16232] copy_process+0x1295/0x3250 [ 497.216321][T16232] ? proc_fail_nth_write+0x213/0x290 [ 497.221440][T16232] ? proc_fail_nth_read+0x220/0x220 [ 497.226473][T16232] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 497.231422][T16232] ? vfs_write+0x9af/0x1050 [ 497.235760][T16232] ? vmacache_update+0xb7/0x120 [ 497.240452][T16232] kernel_clone+0x22d/0x990 [ 497.244788][T16232] ? file_end_write+0x1b0/0x1b0 [ 497.249477][T16232] ? __kasan_check_write+0x14/0x20 [ 497.254422][T16232] ? create_io_thread+0x1e0/0x1e0 [ 497.259281][T16232] ? __mutex_lock_slowpath+0x10/0x10 [ 497.264404][T16232] __x64_sys_clone+0x289/0x310 [ 497.269004][T16232] ? __do_sys_vfork+0x130/0x130 [ 497.273690][T16232] ? debug_smp_processor_id+0x17/0x20 [ 497.278990][T16232] do_syscall_64+0x44/0xd0 [ 497.283234][T16232] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 497.289313][T16232] RIP: 0033:0x7f8ab3ee50d9 [ 497.293566][T16232] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 497.313009][T16232] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 497.321254][T16232] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 497.329064][T16232] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 497.336870][T16232] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 497.344680][T16232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:48:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xf00}, 0x38) 03:48:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r2, &(0x7f0000001940)="bebbe5a10aec211438f957d708ef8a570157cb5c44835ea610cc2edd4b25e44ad4c7c425d87902512aa73a5772b267fdfc599ec67de1a98dfecf41b75302db5364f4c369f5da0faf11aff79c7d8ff3cf54fd08ef0e7b7c4fdd542456e81d3f5526f7322cb77bfeada3303f4abd0911a65d5d6d38919b595c267ee2607102fb03654e44c8fde9000e77d0c2a050ab20d9b8079afab522ae3a480d7fd8783be4f4839afadcf7f517d2ff3e5da79c609d01186e4690d646fdde0e1bfb08cdde096e37ec45788a27be3ecb9b5a9d0e3f85f552dbcda7c1863094839210e8532357ae680733c180e2c5f58865d529a1e924c0f193b922987d11b8", &(0x7f0000000640)=""/179}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@base={0xa, 0x7fff, 0x3, 0x4, 0x1021, 0xffffffffffffffff, 0x9, '\x00', r3, 0xffffffffffffffff, 0x1, 0x5, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x2000}, 0x38) [ 497.352492][T16232] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 497.360309][T16232] 03:48:32 executing program 4: syz_clone(0xc0800400, 0x0, 0x10100000000000, 0x0, 0x0, 0x0) 03:48:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0x9, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4000}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:32 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 61) 03:48:32 executing program 2: r0 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") syz_open_procfs$namespace(r0, &(0x7f0000000200)='ns/time\x00') r1 = perf_event_open$cgroup(&(0x7f0000000400)={0x4, 0x80, 0xff, 0x80, 0x6, 0x0, 0x0, 0x2, 0x40421, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x7}, 0x0, 0x14a, 0x7fff, 0x8, 0x2, 0xa0, 0x74, 0x0, 0xee, 0x0, 0x80000001}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xe) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r1, 0x0, 0xa, &(0x7f0000000280)='syzkaller\x00'}, 0x30) r2 = perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xe0, 0xff, 0x46, 0x9, 0x0, 0x7, 0xe10, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1145, 0x4, @perf_config_ext={0x7, 0x45}, 0x1, 0x7, 0x4, 0x0, 0x3, 0x2, 0x7, 0x0, 0x7, 0x0, 0x100000001}, 0x0, 0xb, r1, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000500)='GPL\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001900)={0xffffffffffffffff, 0xe0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001740), &(0x7f0000001680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000017c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0xd, 0xa, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x50000, 0x1000, &(0x7f0000000580)=""/4096, 0x41000, 0xc, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000015c0), 0x8, 0x10, &(0x7f0000001600)={0x5, 0x0, 0xf28f, 0x4}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000001940)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6]}, 0x80) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001580)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r5, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r4, 0xffffffffffffffff, r9]}, 0x80) openat$cgroup_ro(r5, &(0x7f0000000540)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x15, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3}, [@map_idx={0x18, 0x5, 0x5, 0x0, 0xd}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xd, 0x3, 0x9}, 0x10, r3}, 0x80) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r10}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x60ff}, 0x38) [ 497.408294][T16263] FAULT_INJECTION: forcing a failure. [ 497.408294][T16263] name failslab, interval 1, probability 0, space 0, times 0 [ 497.432926][T16263] CPU: 0 PID: 16263 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 497.443084][T16263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 497.452980][T16263] Call Trace: [ 497.456099][T16263] [ 497.458881][T16263] dump_stack_lvl+0x151/0x1b7 [ 497.463394][T16263] ? bfq_pos_tree_add_move+0x43e/0x43e [ 497.468691][T16263] dump_stack+0x15/0x17 [ 497.472685][T16263] should_fail+0x3c0/0x510 [ 497.476940][T16263] __should_failslab+0x9f/0xe0 [ 497.481534][T16263] should_failslab+0x9/0x20 [ 497.485881][T16263] kmem_cache_alloc+0x4f/0x2f0 [ 497.490478][T16263] ? vm_area_dup+0x26/0x1d0 [ 497.495008][T16263] vm_area_dup+0x26/0x1d0 [ 497.499156][T16263] dup_mmap+0x6b8/0xea0 [ 497.503237][T16263] ? __delayed_free_task+0x20/0x20 [ 497.508181][T16263] ? mm_init+0x807/0x960 [ 497.512265][T16263] dup_mm+0x91/0x330 [ 497.516013][T16263] copy_mm+0x108/0x1b0 [ 497.519982][T16263] copy_process+0x1295/0x3250 [ 497.524497][T16263] ? proc_fail_nth_write+0x213/0x290 [ 497.529620][T16263] ? proc_fail_nth_read+0x220/0x220 [ 497.534652][T16263] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 497.539599][T16263] ? vfs_write+0x9af/0x1050 [ 497.543935][T16263] ? vmacache_update+0xb7/0x120 [ 497.548626][T16263] kernel_clone+0x22d/0x990 [ 497.552965][T16263] ? file_end_write+0x1b0/0x1b0 [ 497.557653][T16263] ? __kasan_check_write+0x14/0x20 [ 497.562598][T16263] ? create_io_thread+0x1e0/0x1e0 [ 497.567458][T16263] ? __mutex_lock_slowpath+0x10/0x10 [ 497.572583][T16263] __x64_sys_clone+0x289/0x310 [ 497.577266][T16263] ? __do_sys_vfork+0x130/0x130 [ 497.581953][T16263] ? debug_smp_processor_id+0x17/0x20 [ 497.587160][T16263] do_syscall_64+0x44/0xd0 [ 497.591413][T16263] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 497.597143][T16263] RIP: 0033:0x7f8ab3ee50d9 [ 497.601394][T16263] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 497.620839][T16263] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 497.629077][T16263] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 497.636888][T16263] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 497.644699][T16263] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 03:48:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x2ffff}, 0x38) 03:48:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x200000}, 0x38) 03:48:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0x9, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4000}, 0x48) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 64) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) (async) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 32) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r2, &(0x7f0000001940)="bebbe5a10aec211438f957d708ef8a570157cb5c44835ea610cc2edd4b25e44ad4c7c425d87902512aa73a5772b267fdfc599ec67de1a98dfecf41b75302db5364f4c369f5da0faf11aff79c7d8ff3cf54fd08ef0e7b7c4fdd542456e81d3f5526f7322cb77bfeada3303f4abd0911a65d5d6d38919b595c267ee2607102fb03654e44c8fde9000e77d0c2a050ab20d9b8079afab522ae3a480d7fd8783be4f4839afadcf7f517d2ff3e5da79c609d01186e4690d646fdde0e1bfb08cdde096e37ec45788a27be3ecb9b5a9d0e3f85f552dbcda7c1863094839210e8532357ae680733c180e2c5f58865d529a1e924c0f193b922987d11b8", &(0x7f0000000640)=""/179}, 0x20) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@base={0xa, 0x7fff, 0x3, 0x4, 0x1021, 0xffffffffffffffff, 0x9, '\x00', r3, 0xffffffffffffffff, 0x1, 0x5, 0x3}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 497.652514][T16263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 497.660323][T16263] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 497.668139][T16263] 03:48:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x4002a0}, 0x38) 03:48:33 executing program 4: syz_clone(0xc0800400, 0x0, 0x4002a0ffffffff, 0x0, 0x0, 0x0) 03:48:33 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62) 03:48:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (rerun: 64) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async, rerun: 32) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r2, &(0x7f0000001940)="bebbe5a10aec211438f957d708ef8a570157cb5c44835ea610cc2edd4b25e44ad4c7c425d87902512aa73a5772b267fdfc599ec67de1a98dfecf41b75302db5364f4c369f5da0faf11aff79c7d8ff3cf54fd08ef0e7b7c4fdd542456e81d3f5526f7322cb77bfeada3303f4abd0911a65d5d6d38919b595c267ee2607102fb03654e44c8fde9000e77d0c2a050ab20d9b8079afab522ae3a480d7fd8783be4f4839afadcf7f517d2ff3e5da79c609d01186e4690d646fdde0e1bfb08cdde096e37ec45788a27be3ecb9b5a9d0e3f85f552dbcda7c1863094839210e8532357ae680733c180e2c5f58865d529a1e924c0f193b922987d11b8", &(0x7f0000000640)=""/179}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@base={0xa, 0x7fff, 0x3, 0x4, 0x1021, 0xffffffffffffffff, 0x9, '\x00', r3, 0xffffffffffffffff, 0x1, 0x5, 0x3}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:33 executing program 2: r0 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") syz_open_procfs$namespace(r0, &(0x7f0000000200)='ns/time\x00') (async) r1 = perf_event_open$cgroup(&(0x7f0000000400)={0x4, 0x80, 0xff, 0x80, 0x6, 0x0, 0x0, 0x2, 0x40421, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x7}, 0x0, 0x14a, 0x7fff, 0x8, 0x2, 0xa0, 0x74, 0x0, 0xee, 0x0, 0x80000001}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xe) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r1, 0x0, 0xa, &(0x7f0000000280)='syzkaller\x00'}, 0x30) r2 = perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xe0, 0xff, 0x46, 0x9, 0x0, 0x7, 0xe10, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1145, 0x4, @perf_config_ext={0x7, 0x45}, 0x1, 0x7, 0x4, 0x0, 0x3, 0x2, 0x7, 0x0, 0x7, 0x0, 0x100000001}, 0x0, 0xb, r1, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000500)='GPL\x00') (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001900)={0xffffffffffffffff, 0xe0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001740), &(0x7f0000001680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000017c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0xd, 0xa, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x50000, 0x1000, &(0x7f0000000580)=""/4096, 0x41000, 0xc, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000015c0), 0x8, 0x10, &(0x7f0000001600)={0x5, 0x0, 0xf28f, 0x4}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000001940)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 32) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6]}, 0x80) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001580)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 64) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r5, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r4, 0xffffffffffffffff, r9]}, 0x80) openat$cgroup_ro(r5, &(0x7f0000000540)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x15, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3}, [@map_idx={0x18, 0x5, 0x5, 0x0, 0xd}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xd, 0x3, 0x9}, 0x10, r3}, 0x80) (async) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r10}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0x9, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4000}, 0x48) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 32) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 32) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xf0ff1f}, 0x38) 03:48:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x1000000}, 0x38) [ 497.850560][T16303] FAULT_INJECTION: forcing a failure. [ 497.850560][T16303] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 497.882085][T16303] CPU: 0 PID: 16303 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 497.892425][T16303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 497.902324][T16303] Call Trace: [ 497.905438][T16303] [ 497.908220][T16303] dump_stack_lvl+0x151/0x1b7 [ 497.912731][T16303] ? bfq_pos_tree_add_move+0x43e/0x43e [ 497.918027][T16303] dump_stack+0x15/0x17 [ 497.922021][T16303] should_fail+0x3c0/0x510 [ 497.926272][T16303] should_fail_alloc_page+0x58/0x70 [ 497.931340][T16303] __alloc_pages+0x1de/0x7c0 [ 497.935771][T16303] ? __count_vm_events+0x30/0x30 [ 497.940508][T16303] ? __this_cpu_preempt_check+0x13/0x20 [ 497.945882][T16303] ? __mod_node_page_state+0xac/0xf0 [ 497.951007][T16303] pte_alloc_one+0x73/0x1b0 [ 497.955348][T16303] ? pfn_modify_allowed+0x2e0/0x2e0 [ 497.960380][T16303] __pte_alloc+0x86/0x350 [ 497.964547][T16303] ? free_pgtables+0x210/0x210 [ 497.969152][T16303] ? _raw_spin_lock+0xa3/0x1b0 [ 497.973750][T16303] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 497.978956][T16303] ? __kernel_text_address+0x9a/0x110 [ 497.984163][T16303] copy_pte_range+0x1b1f/0x20b0 [ 497.988857][T16303] ? __kunmap_atomic+0x80/0x80 [ 497.993448][T16303] ? __kasan_slab_alloc+0xc4/0xe0 [ 497.998309][T16303] ? __kasan_slab_alloc+0xb2/0xe0 [ 498.003173][T16303] ? kmem_cache_alloc+0x189/0x2f0 [ 498.008031][T16303] ? vm_area_dup+0x26/0x1d0 [ 498.012374][T16303] ? dup_mmap+0x6b8/0xea0 [ 498.016536][T16303] ? dup_mm+0x91/0x330 [ 498.020443][T16303] ? copy_mm+0x108/0x1b0 [ 498.024519][T16303] ? copy_process+0x1295/0x3250 [ 498.029208][T16303] ? kernel_clone+0x22d/0x990 [ 498.033723][T16303] ? __x64_sys_clone+0x289/0x310 [ 498.038494][T16303] ? do_syscall_64+0x44/0xd0 [ 498.044570][T16303] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 498.050478][T16303] copy_page_range+0xc1e/0x1090 [ 498.055165][T16303] ? pfn_valid+0x1e0/0x1e0 [ 498.059413][T16303] dup_mmap+0x99f/0xea0 [ 498.063408][T16303] ? __delayed_free_task+0x20/0x20 [ 498.068369][T16303] ? mm_init+0x807/0x960 [ 498.072431][T16303] dup_mm+0x91/0x330 [ 498.076164][T16303] copy_mm+0x108/0x1b0 [ 498.080069][T16303] copy_process+0x1295/0x3250 [ 498.084586][T16303] ? proc_fail_nth_write+0x213/0x290 [ 498.089703][T16303] ? proc_fail_nth_read+0x220/0x220 [ 498.094739][T16303] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 498.099684][T16303] ? vfs_write+0x9af/0x1050 [ 498.104034][T16303] ? vmacache_update+0xb7/0x120 [ 498.108711][T16303] kernel_clone+0x22d/0x990 [ 498.113049][T16303] ? file_end_write+0x1b0/0x1b0 [ 498.117735][T16303] ? __kasan_check_write+0x14/0x20 [ 498.122686][T16303] ? create_io_thread+0x1e0/0x1e0 [ 498.127550][T16303] ? __mutex_lock_slowpath+0x10/0x10 [ 498.132667][T16303] __x64_sys_clone+0x289/0x310 [ 498.137268][T16303] ? __do_sys_vfork+0x130/0x130 [ 498.141950][T16303] ? debug_smp_processor_id+0x17/0x20 [ 498.147160][T16303] do_syscall_64+0x44/0xd0 [ 498.151413][T16303] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 498.157140][T16303] RIP: 0033:0x7f8ab3ee50d9 [ 498.161404][T16303] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 498.180835][T16303] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 498.189080][T16303] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 03:48:33 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) [ 498.196891][T16303] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 498.204715][T16303] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 498.212514][T16303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 498.220674][T16303] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 498.228491][T16303] 03:48:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x2000000}, 0x38) 03:48:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x3000000}, 0x38) 03:48:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x9, 0x3, 0x1f, 0x7, 0x0, 0x0, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0xdee5, 0x6}, 0x1000, 0x0, 0x9, 0x3, 0x2, 0x3, 0x1, 0x0, 0xf2, 0x0, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffffffffdd4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 498.289301][T16326] FAULT_INJECTION: forcing a failure. [ 498.289301][T16326] name failslab, interval 1, probability 0, space 0, times 0 [ 498.343029][T16326] CPU: 1 PID: 16326 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 498.353112][T16326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 498.363006][T16326] Call Trace: [ 498.366137][T16326] [ 498.368909][T16326] dump_stack_lvl+0x151/0x1b7 [ 498.373421][T16326] ? bfq_pos_tree_add_move+0x43e/0x43e [ 498.378717][T16326] dump_stack+0x15/0x17 [ 498.382706][T16326] should_fail+0x3c0/0x510 [ 498.386960][T16326] __should_failslab+0x9f/0xe0 [ 498.391567][T16326] should_failslab+0x9/0x20 [ 498.395901][T16326] kmem_cache_alloc+0x4f/0x2f0 [ 498.400503][T16326] ? anon_vma_clone+0xa1/0x4f0 [ 498.405099][T16326] anon_vma_clone+0xa1/0x4f0 [ 498.409528][T16326] anon_vma_fork+0x91/0x4f0 [ 498.413865][T16326] ? anon_vma_name+0x43/0x70 [ 498.418295][T16326] dup_mmap+0x750/0xea0 [ 498.422288][T16326] ? __delayed_free_task+0x20/0x20 [ 498.427235][T16326] ? mm_init+0x807/0x960 [ 498.431324][T16326] dup_mm+0x91/0x330 [ 498.435045][T16326] copy_mm+0x108/0x1b0 [ 498.438949][T16326] copy_process+0x1295/0x3250 [ 498.443466][T16326] ? proc_fail_nth_write+0x213/0x290 [ 498.448596][T16326] ? proc_fail_nth_read+0x220/0x220 [ 498.453626][T16326] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 498.458565][T16326] ? vfs_write+0x9af/0x1050 [ 498.462906][T16326] ? vmacache_update+0xb7/0x120 [ 498.467605][T16326] kernel_clone+0x22d/0x990 [ 498.471929][T16326] ? file_end_write+0x1b0/0x1b0 [ 498.476617][T16326] ? __kasan_check_write+0x14/0x20 [ 498.481564][T16326] ? create_io_thread+0x1e0/0x1e0 [ 498.486438][T16326] ? __mutex_lock_slowpath+0x10/0x10 [ 498.491553][T16326] __x64_sys_clone+0x289/0x310 [ 498.496147][T16326] ? __do_sys_vfork+0x130/0x130 [ 498.500838][T16326] ? debug_smp_processor_id+0x17/0x20 [ 498.506042][T16326] do_syscall_64+0x44/0xd0 [ 498.510293][T16326] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 498.516030][T16326] RIP: 0033:0x7f8ab3ee50d9 [ 498.520278][T16326] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 498.539732][T16326] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 498.547962][T16326] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 498.555775][T16326] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 498.563584][T16326] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 498.571397][T16326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 498.579208][T16326] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 498.587021][T16326] 03:48:34 executing program 4: syz_clone(0xc0800400, 0x0, 0x90000000000000, 0x0, 0x0, 0x0) 03:48:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 32) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000}, 0x48) (rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x8000000}, 0x38) 03:48:34 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) 03:48:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x9, 0x3, 0x1f, 0x7, 0x0, 0x0, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0xdee5, 0x6}, 0x1000, 0x0, 0x9, 0x3, 0x2, 0x3, 0x1, 0x0, 0xf2, 0x0, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffffffffdd4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x9, 0x3, 0x1f, 0x7, 0x0, 0x0, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0xdee5, 0x6}, 0x1000, 0x0, 0x9, 0x3, 0x2, 0x3, 0x1, 0x0, 0xf2, 0x0, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffffffffdd4, &(0x7f0000000640)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) 03:48:34 executing program 2: r0 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") syz_open_procfs$namespace(r0, &(0x7f0000000200)='ns/time\x00') (async) r1 = perf_event_open$cgroup(&(0x7f0000000400)={0x4, 0x80, 0xff, 0x80, 0x6, 0x0, 0x0, 0x2, 0x40421, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x7}, 0x0, 0x14a, 0x7fff, 0x8, 0x2, 0xa0, 0x74, 0x0, 0xee, 0x0, 0x80000001}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xe) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r1, 0x0, 0xa, &(0x7f0000000280)='syzkaller\x00'}, 0x30) (async) r2 = perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xe0, 0xff, 0x46, 0x9, 0x0, 0x7, 0xe10, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1145, 0x4, @perf_config_ext={0x7, 0x45}, 0x1, 0x7, 0x4, 0x0, 0x3, 0x2, 0x7, 0x0, 0x7, 0x0, 0x100000001}, 0x0, 0xb, r1, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000500)='GPL\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001900)={0xffffffffffffffff, 0xe0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001740), &(0x7f0000001680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000017c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0xd, 0xa, &(0x7f0000002540)=ANY=[@ANYBLOB="57ad0e34a9180000718300005659ae9e384c2917f1e0000000000000007f87985855a012000000000007000000ff32658eba502f42bb0900000408000080000000000001000100000000001869000002000095d01e39b54b17dcc388275d044bb253b5e1ab171cb71c012b5efadffb92f669d0560e61df6525691a9054e579f3388076e14de83694f1faeb87b973dc0d2f29df0e245bf2a005c0ba7842cbb19d77c64cb25e45907a280260299d506de9591584fe82bf5a1fcaa9098e91edd31619c16aea3324b42497c5f20bff32d607c846e0555e4afd7ac5112439edb80e9cdf525b7aad9fdb8c73115b3b02163123ed8555b27ec4b527ea859e37682f4cb617d319495e92b6db030ae97322a1512a6c187614bf2f3108e4003d16695b5166ace6760441e3d7bdf0b54b"], &(0x7f0000000340)='syzkaller\x00', 0x50000, 0x1000, &(0x7f0000000580)=""/4096, 0x41000, 0xc, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000015c0), 0x8, 0x10, &(0x7f0000001600)={0x5, 0x0, 0xf28f, 0x4}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000001940)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6]}, 0x80) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001580)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r7, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r9, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r9, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r5, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r4, 0xffffffffffffffff, r9]}, 0x80) openat$cgroup_ro(r5, &(0x7f0000000540)='blkio.bfq.io_serviced\x00', 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x15, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3}, [@map_idx={0x18, 0x5, 0x5, 0x0, 0xd}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xd, 0x3, 0x9}, 0x10, r3}, 0x80) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r10}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) [ 498.908394][T16350] FAULT_INJECTION: forcing a failure. [ 498.908394][T16350] name failslab, interval 1, probability 0, space 0, times 0 [ 498.922261][T16350] CPU: 1 PID: 16350 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 498.932343][T16350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 498.942242][T16350] Call Trace: [ 498.945361][T16350] [ 498.948136][T16350] dump_stack_lvl+0x151/0x1b7 [ 498.952649][T16350] ? bfq_pos_tree_add_move+0x43e/0x43e [ 498.957945][T16350] dump_stack+0x15/0x17 [ 498.961935][T16350] should_fail+0x3c0/0x510 [ 498.966191][T16350] __should_failslab+0x9f/0xe0 [ 498.970787][T16350] should_failslab+0x9/0x20 [ 498.975135][T16350] kmem_cache_alloc+0x4f/0x2f0 [ 498.979741][T16350] ? vm_area_dup+0x26/0x1d0 [ 498.984068][T16350] vm_area_dup+0x26/0x1d0 [ 498.988238][T16350] dup_mmap+0x6b8/0xea0 [ 498.992231][T16350] ? __delayed_free_task+0x20/0x20 [ 498.997174][T16350] ? mm_init+0x807/0x960 [ 499.001260][T16350] dup_mm+0x91/0x330 [ 499.004988][T16350] copy_mm+0x108/0x1b0 [ 499.008890][T16350] copy_process+0x1295/0x3250 [ 499.013411][T16350] ? proc_fail_nth_write+0x213/0x290 [ 499.018526][T16350] ? proc_fail_nth_read+0x220/0x220 [ 499.023559][T16350] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 499.028507][T16350] ? vfs_write+0x9af/0x1050 [ 499.032850][T16350] ? vmacache_update+0xb7/0x120 [ 499.037535][T16350] kernel_clone+0x22d/0x990 [ 499.041873][T16350] ? file_end_write+0x1b0/0x1b0 [ 499.046660][T16350] ? __kasan_check_write+0x14/0x20 [ 499.051605][T16350] ? create_io_thread+0x1e0/0x1e0 [ 499.056464][T16350] ? __mutex_lock_slowpath+0x10/0x10 [ 499.061586][T16350] __x64_sys_clone+0x289/0x310 [ 499.066188][T16350] ? __do_sys_vfork+0x130/0x130 [ 499.070964][T16350] ? debug_smp_processor_id+0x17/0x20 [ 499.076166][T16350] do_syscall_64+0x44/0xd0 [ 499.080418][T16350] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 499.086148][T16350] RIP: 0033:0x7f8ab3ee50d9 [ 499.090403][T16350] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 499.109842][T16350] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 499.118092][T16350] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 499.125898][T16350] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 499.133710][T16350] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 499.141521][T16350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 499.149334][T16350] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 03:48:34 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) 03:48:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x9, 0x3, 0x1f, 0x7, 0x0, 0x0, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0xdee5, 0x6}, 0x1000, 0x0, 0x9, 0x3, 0x2, 0x3, 0x1, 0x0, 0xf2, 0x0, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (rerun: 32) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffffffffdd4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (rerun: 64) 03:48:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xf000000}, 0x38) [ 499.157148][T16350] 03:48:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x10000000}, 0x38) 03:48:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r8, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r8, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r2, 0x7ff, 0x10}, 0xc) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000800)={r5}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="8500000088000000183b000205000000005703f0ff10000000"], &(0x7f0000000480)='GPL\x00', 0x9, 0x86, &(0x7f0000000640)=""/134, 0x41100, 0x6, '\x00', 0x0, 0xe08cd54202ed586c, r1, 0x8, &(0x7f00000004c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0x8, 0x1, 0x5562}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r7, r1, r9, r1, r0, r10]}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYRES16=r2, @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0x0, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r5]}, 0x80) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1e, 0x9, 0x0, 0x20, 0x262, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x11, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x4}, [@alu={0x4, 0x0, 0x3, 0x2, 0x7, 0xffffffffffffffff, 0x10}, @ldst={0x3, 0x2, 0x0, 0x3, 0x6, 0xfffffffffffffff8, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4}, @generic={0x40, 0x3, 0x7, 0x2, 0x401}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffc4}, @map_fd={0x18, 0x5}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x33}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000000)='syzkaller\x00', 0x9, 0xc, &(0x7f0000000040)=""/12, 0x41100, 0x9, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x4, 0x7, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0x1, r11, 0xffffffffffffffff, r12]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r13, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) [ 499.222810][T16372] FAULT_INJECTION: forcing a failure. [ 499.222810][T16372] name failslab, interval 1, probability 0, space 0, times 0 [ 499.253755][T16372] CPU: 0 PID: 16372 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 499.263831][T16372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 499.273725][T16372] Call Trace: [ 499.276848][T16372] [ 499.279626][T16372] dump_stack_lvl+0x151/0x1b7 [ 499.284142][T16372] ? bfq_pos_tree_add_move+0x43e/0x43e [ 499.289440][T16372] dump_stack+0x15/0x17 [ 499.293431][T16372] should_fail+0x3c0/0x510 [ 499.297681][T16372] __should_failslab+0x9f/0xe0 [ 499.302280][T16372] should_failslab+0x9/0x20 [ 499.306619][T16372] kmem_cache_alloc+0x4f/0x2f0 [ 499.311220][T16372] ? anon_vma_fork+0x1b9/0x4f0 [ 499.315822][T16372] anon_vma_fork+0x1b9/0x4f0 [ 499.320251][T16372] dup_mmap+0x750/0xea0 [ 499.324244][T16372] ? __delayed_free_task+0x20/0x20 [ 499.329198][T16372] ? mm_init+0x807/0x960 [ 499.333265][T16372] dup_mm+0x91/0x330 [ 499.336997][T16372] copy_mm+0x108/0x1b0 [ 499.340904][T16372] copy_process+0x1295/0x3250 [ 499.345419][T16372] ? proc_fail_nth_write+0x213/0x290 [ 499.350537][T16372] ? proc_fail_nth_read+0x220/0x220 [ 499.355574][T16372] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 499.360518][T16372] ? vfs_write+0x9af/0x1050 [ 499.364858][T16372] ? vmacache_update+0xb7/0x120 [ 499.369546][T16372] kernel_clone+0x22d/0x990 [ 499.373884][T16372] ? file_end_write+0x1b0/0x1b0 [ 499.378579][T16372] ? __kasan_check_write+0x14/0x20 [ 499.383518][T16372] ? create_io_thread+0x1e0/0x1e0 [ 499.388381][T16372] ? __mutex_lock_slowpath+0x10/0x10 [ 499.393506][T16372] __x64_sys_clone+0x289/0x310 [ 499.398101][T16372] ? __do_sys_vfork+0x130/0x130 [ 499.402788][T16372] ? debug_smp_processor_id+0x17/0x20 [ 499.407999][T16372] do_syscall_64+0x44/0xd0 [ 499.412274][T16372] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 499.417976][T16372] RIP: 0033:0x7f8ab3ee50d9 [ 499.422231][T16372] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 499.441672][T16372] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 499.449916][T16372] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 499.457730][T16372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 499.465541][T16372] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 03:48:34 executing program 4: syz_clone(0xc0800400, 0x0, 0xc0ec253a550000, 0x0, 0x0, 0x0) 03:48:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x1ffff000}, 0x38) 03:48:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x755280, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000200)=r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@bloom_filter={0x1e, 0x7113, 0x5, 0x9000, 0x4, 0xffffffffffffffff, 0x40, '\x00', r6, r3, 0x1, 0x0, 0x1, 0xd}, 0x48) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e631a75568739e5be0b000000000080000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000000000)=0x7) 03:48:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0c183efeff0002ffba88321400000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:34 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) [ 499.473350][T16372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 499.481171][T16372] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 499.488978][T16372] 03:48:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r8, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 32) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r8, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r2, 0x7ff, 0x10}, 0xc) (async) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000800)={r5}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="8500000088000000183b000205000000005703f0ff10000000"], &(0x7f0000000480)='GPL\x00', 0x9, 0x86, &(0x7f0000000640)=""/134, 0x41100, 0x6, '\x00', 0x0, 0xe08cd54202ed586c, r1, 0x8, &(0x7f00000004c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0x8, 0x1, 0x5562}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r7, r1, r9, r1, r0, r10]}, 0x80) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYRES16=r2, @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0x0, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r5]}, 0x80) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1e, 0x9, 0x0, 0x20, 0x262, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x11, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x4}, [@alu={0x4, 0x0, 0x3, 0x2, 0x7, 0xffffffffffffffff, 0x10}, @ldst={0x3, 0x2, 0x0, 0x3, 0x6, 0xfffffffffffffff8, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4}, @generic={0x40, 0x3, 0x7, 0x2, 0x401}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffc4}, @map_fd={0x18, 0x5}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x33}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000000)='syzkaller\x00', 0x9, 0xc, &(0x7f0000000040)=""/12, 0x41100, 0x9, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x4, 0x7, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0x1, r11, 0xffffffffffffffff, r12]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r13, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x20000000}, 0x38) 03:48:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x755280, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000200)=r4) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@bloom_filter={0x1e, 0x7113, 0x5, 0x9000, 0x4, 0xffffffffffffffff, 0x40, '\x00', r6, r3, 0x1, 0x0, 0x1, 0xd}, 0x48) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e631a75568739e5be0b000000000080000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000000000)=0x7) 03:48:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r8, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r8, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) (async) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r2, 0x7ff, 0x10}, 0xc) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000800)={r5}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="8500000088000000183b000205000000005703f0ff10000000"], &(0x7f0000000480)='GPL\x00', 0x9, 0x86, &(0x7f0000000640)=""/134, 0x41100, 0x6, '\x00', 0x0, 0xe08cd54202ed586c, r1, 0x8, &(0x7f00000004c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0x8, 0x1, 0x5562}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r7, r1, r9, r1, r0, r10]}, 0x80) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYRES16=r2, @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0x0, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r5]}, 0x80) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1e, 0x9, 0x0, 0x20, 0x262, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x11, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x4}, [@alu={0x4, 0x0, 0x3, 0x2, 0x7, 0xffffffffffffffff, 0x10}, @ldst={0x3, 0x2, 0x0, 0x3, 0x6, 0xfffffffffffffff8, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4}, @generic={0x40, 0x3, 0x7, 0x2, 0x401}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffc4}, @map_fd={0x18, 0x5}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x33}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000000)='syzkaller\x00', 0x9, 0xc, &(0x7f0000000040)=""/12, 0x41100, 0x9, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x4, 0x7, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0x1, r11, 0xffffffffffffffff, r12]}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r13, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x21000000}, 0x38) [ 499.625587][T16413] FAULT_INJECTION: forcing a failure. [ 499.625587][T16413] name failslab, interval 1, probability 0, space 0, times 0 [ 499.656295][T16413] CPU: 0 PID: 16413 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 499.666489][T16413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 499.676390][T16413] Call Trace: [ 499.679503][T16413] [ 499.682283][T16413] dump_stack_lvl+0x151/0x1b7 [ 499.686797][T16413] ? bfq_pos_tree_add_move+0x43e/0x43e [ 499.692089][T16413] dump_stack+0x15/0x17 [ 499.696081][T16413] should_fail+0x3c0/0x510 [ 499.700336][T16413] __should_failslab+0x9f/0xe0 [ 499.704933][T16413] should_failslab+0x9/0x20 [ 499.709272][T16413] kmem_cache_alloc+0x4f/0x2f0 [ 499.713874][T16413] ? anon_vma_fork+0x1b9/0x4f0 [ 499.718473][T16413] anon_vma_fork+0x1b9/0x4f0 [ 499.722899][T16413] dup_mmap+0x750/0xea0 [ 499.726991][T16413] ? __delayed_free_task+0x20/0x20 [ 499.731934][T16413] ? mm_init+0x807/0x960 [ 499.736007][T16413] dup_mm+0x91/0x330 [ 499.739802][T16413] copy_mm+0x108/0x1b0 [ 499.743648][T16413] copy_process+0x1295/0x3250 [ 499.748165][T16413] ? proc_fail_nth_write+0x213/0x290 [ 499.753282][T16413] ? proc_fail_nth_read+0x220/0x220 [ 499.758313][T16413] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 499.763268][T16413] ? vfs_write+0x9af/0x1050 [ 499.767602][T16413] ? vmacache_update+0xb7/0x120 [ 499.772290][T16413] kernel_clone+0x22d/0x990 [ 499.776627][T16413] ? file_end_write+0x1b0/0x1b0 [ 499.781316][T16413] ? __kasan_check_write+0x14/0x20 [ 499.786269][T16413] ? create_io_thread+0x1e0/0x1e0 [ 499.791120][T16413] ? __mutex_lock_slowpath+0x10/0x10 [ 499.796250][T16413] __x64_sys_clone+0x289/0x310 [ 499.800845][T16413] ? __do_sys_vfork+0x130/0x130 [ 499.805533][T16413] ? debug_smp_processor_id+0x17/0x20 [ 499.810739][T16413] do_syscall_64+0x44/0xd0 [ 499.814990][T16413] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 499.820802][T16413] RIP: 0033:0x7f8ab3ee50d9 [ 499.825146][T16413] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 499.844681][T16413] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 499.852918][T16413] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 499.860728][T16413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 499.868537][T16413] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 03:48:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0c183efeff0002ffba88321400000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:35 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) [ 499.876348][T16413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 499.884161][T16413] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 499.891977][T16413] [ 499.953645][T16430] FAULT_INJECTION: forcing a failure. [ 499.953645][T16430] name failslab, interval 1, probability 0, space 0, times 0 [ 500.005358][T16430] CPU: 0 PID: 16430 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 500.015442][T16430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 500.025329][T16430] Call Trace: [ 500.028453][T16430] [ 500.031233][T16430] dump_stack_lvl+0x151/0x1b7 [ 500.035743][T16430] ? bfq_pos_tree_add_move+0x43e/0x43e [ 500.041049][T16430] ? do_syscall_64+0x44/0xd0 [ 500.045537][T16430] dump_stack+0x15/0x17 [ 500.049455][T16430] should_fail+0x3c0/0x510 [ 500.053712][T16430] __should_failslab+0x9f/0xe0 [ 500.058324][T16430] should_failslab+0x9/0x20 [ 500.062650][T16430] kmem_cache_alloc+0x4f/0x2f0 [ 500.067248][T16430] ? anon_vma_clone+0xa1/0x4f0 [ 500.071850][T16430] anon_vma_clone+0xa1/0x4f0 [ 500.076278][T16430] anon_vma_fork+0x91/0x4f0 [ 500.080614][T16430] ? anon_vma_name+0x4c/0x70 [ 500.085041][T16430] dup_mmap+0x750/0xea0 [ 500.089037][T16430] ? __delayed_free_task+0x20/0x20 [ 500.093982][T16430] ? mm_init+0x807/0x960 [ 500.098063][T16430] dup_mm+0x91/0x330 [ 500.101790][T16430] copy_mm+0x108/0x1b0 [ 500.105696][T16430] copy_process+0x1295/0x3250 [ 500.110213][T16430] ? proc_fail_nth_write+0x213/0x290 [ 500.115334][T16430] ? proc_fail_nth_read+0x220/0x220 [ 500.120373][T16430] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 500.125485][T16430] ? vfs_write+0x9af/0x1050 [ 500.129836][T16430] ? vmacache_update+0xb7/0x120 [ 500.134514][T16430] kernel_clone+0x22d/0x990 [ 500.138859][T16430] ? file_end_write+0x1b0/0x1b0 [ 500.143540][T16430] ? __kasan_check_write+0x14/0x20 [ 500.148490][T16430] ? create_io_thread+0x1e0/0x1e0 [ 500.153359][T16430] ? __mutex_lock_slowpath+0x10/0x10 [ 500.158468][T16430] __x64_sys_clone+0x289/0x310 [ 500.163068][T16430] ? __do_sys_vfork+0x130/0x130 [ 500.167757][T16430] ? debug_smp_processor_id+0x17/0x20 [ 500.172964][T16430] do_syscall_64+0x44/0xd0 [ 500.177219][T16430] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 500.182944][T16430] RIP: 0033:0x7f8ab3ee50d9 [ 500.187202][T16430] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 500.206640][T16430] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 500.214883][T16430] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 500.222700][T16430] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 500.230506][T16430] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 500.238317][T16430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 500.246130][T16430] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 500.253946][T16430] 03:48:35 executing program 4: syz_clone(0xc0800400, 0x0, 0xe0e6aeb8290000, 0x0, 0x0, 0x0) 03:48:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x755280, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000200)=r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@bloom_filter={0x1e, 0x7113, 0x5, 0x9000, 0x4, 0xffffffffffffffff, 0x40, '\x00', r6, r3, 0x1, 0x0, 0x1, 0xd}, 0x48) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e631a75568739e5be0b000000000080000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000000000)=0x7) 03:48:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x5, 0xfffd, 0x2, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000, 0xfffffffe}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18431c8700000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r7]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r4, 0x30f3, 0x8}, 0xc) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff, r8, 0xffffffffffffffff, r12]}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000009c0)="21ebd55d3e9d013454562358918cd7ec2454e70c58110d07414afa3b26c415af948dbf31a4a2763bab1de6b14ad75230f12834edec0c9afb6a6a6a10bffaccc758cb63294427bd60ddec4effedbd0f638199fc6285316754676838442af9b15cebee5310459c9e4a527ea377ecea159134748243370b5828f4923f45bc937c7de9d001210861bb1402fb9b8a7108c602e31e9304554ffa42537c83f187a8e86db132a69935263c8c6c37f4aafe766322ee1eab9def6c8bbfe32281c945fb42762f0da142dfae8339faafc61fddd8be1d94118847dbfd20f5146c384fb9af26a266ee1d903c6e114da2dede1037c5360699e21797652b949e5bc2340e94403c1709d0b5fba3a128b00958a990dd63c71b2402ef23ae3c4c189ce2f1f68046e15dd34ffa9533b6dfc58f2480b808d5da1c81595c06f15b2e40d108d95ef53b5fa48056e94c346e61f99ab9ebecf0f46ebcb174091f3ff5cef0389ba1ffce2dcfde6a2dc152646af05033e7db735603bc3d4fcd556ce65f7b3814eadf248cd0aa9300057b493f98da861c0f199ef9ced5407e54fdf76b384ed6c16e8a13901451afa4896dbc9568a8d714dd14b87b36026fbf06f75791816a1ee6d21860a7e92f08bda31d834ba6f15d3e21dc53376783b16364de032596d53c1865cc154e3c8193b5a90bf941d467a476bfb259bdf31d09e1436edf250d9500911fcffcec0bd9276583d2a2112dcfc41832294783fb18528a966540929757eff0e8b75d9bb4c92442ce6e0880226730f74f6a5795d0032291be08ccf27742b26682732ef4636ea7a92d712d0da45ae6bd0f676a9a4cb0312d3883a6799b89375d21c93a5a2e5390a786d248bd412a22475cf4328ba51af433523a1a637172329a2e2202376bb251cb0ffffa0e5d9a2755fb9b2afcde009cbb35f26856d99344f1871fd999c6962d0ce27d411e29982bc20f6e78d19f78d348a1ecf2eefdbd0f404c213fb12d93ee5d12173cf430cbbd9d894a054bbd7a637d3fe6548ea3cee6f07e6699e6b4e56c816585e764e0abd737b4ef3d1d153e65b248ae60483c17bb20fab13901a560ce3c88dda305619a023886c9ce724f2dc8461021c20f9cecb2e79afc6e43c57147602bd845ef16d0529eb607943559d15e35cb164a05a1187c9c2f9f2406bb736911af4e443a04c5e4914592aaf32b69088ac0c5d759a243b6a9f11dfcabd763ba02e3332647a24b928f07b1a69d2149789397aa81840959c604385274796c03ed442de76ed0433701561ae62ad7128734aa2816f0553c9d6b2f2f5a91655b8280f2a48126d6b7d32efddd7310ce088347a21501bd36ec19d1c7640e3ca5a17ee2000af3515dde4df1f71cc077426e6be3bbb27efd9c7068e0a77caed6d5f6507b68f98925ed682aebf5091d6067bcf563c07f5cf11fb3b76d46c2c780526fc4e2ef1f0543c9f1142b9834b22c70041520d533e06f25708081d451e771b7a158ea6b63936c6801f92bd4c3ed33d5c676d4ac3f2ffedbc552e9b76acc56d0b7ec870740c4581f6c458e3b4e895c1723c554ad7f8e7452d005570461417fb5cd52ce8c5d63d60428665be9d239a1f7c32aee506724c6bd9f913c7a47644c5b66468b46029f2ba3eb3a50156f90e7447c8f95ab4cfadae513f59e84c948db8d46b931611c552494af235b7b969af4dd168dafb9754bfbc260ef304fc717cd3e21992bce745ebeff600e602dbc969ae2bf95b1353a2557c3cf10e81f191ef8e3f5bf36f2baac8d5b3797bedc43a6aab4d6920bb05b62dfff80ad1c7215e2b627fde901453ec07a1ab7df7a7cb53a9920ca420d83db12f34086015577b973645903f37232ec70d49ff12d1d0b1f56322e3204d52a52b8221037e7e9aa3a5cd4e8bb33f83a312693df879c8a9da7a8ea6b0f1c9fcfb6a00d9436286589ec888b0278f202dd8a2394d5edd23eddce2fb4cee39698dfad1f7372f1da4df6e5417c66680b8a1a29ac13dc8ef130f282dc99a62dc47b565d4da5ccbb67d680b59496a3b8e5a044fa9035dfaaf787e316733c07f64f44f227f4aec6d866cd4d999345cc41d09093ec9b929e0df27f38006eb4ef87992cc279f5e2c85827139980310f07e6addadf1ca8f69afad167030643f60a6b296a5e09aa01caf9a3c7ed37d50c06365685af32823896d2aeabf9e526b0bfaa458b1747fcf6663388a7de8bf2e03a9ead4217772d6fd18e77f8713731b6d3c5e6af25b1ea0d4508d2d599b9f52b297fad6dcfb377a58b3a23ddf3c79bc490dd1ef3779623454796f4e34c6527fb592ff10cbed4f96affa961c09a3b19f8901798c735bdfa4804556ea78fc440e65626ce01fc731a87746c1dae10e4191743dd3db7ca492888d82f78a99bbed8ad5093b4ccbb1bb66c12124aa2250a11abba690d9220d26ee305e501fbe82595290a5ac4dba155fdf9d72c344fa0863b8a09f62f21f7b7b259322f496dc79c4dca1b3513e02e62a498cd02a93c822968768c967b5926daf78d09909855304ce2d13cc49c8b87b42d3fb1ee541f5e872cb32294e60ffafb2d44998603fd7210b365d158d514ff7506fb577593b6637525d4a0d050e27c3ccff03fe27697128f3014ab92fbd969d23f4544ddc6ae184064a901bb8a5ec831937625385695f3d57ec2c17adf643238103dfd2710719887fe48c69b3d75e8d1c83af001fed97a0ea072fb838acbb3a692993931727ac6e5f76f195afcf954b4952abf5c56c7e96db901d276d677e9f0dd070f75b9155043a943bc6d3284825c294ba33a77d38fae951424ad6bea1d436644d0d823dfca18da640ca0f3a489c0c870eab27a2a35e103a2f315814a4ba4cb8fe824603cefa336f4f7e0b16a3d7c08715435d92af216bf0c2e7137bf54b70fd63800187c6ca488e9c88b088fb27b63f31718bca1b9f1cdf8f4f32479fc968dcb528b053bfee1c5a2ed6a85988df557ce547e882c3695852dba4daa30ff25326aeb1049799d56853a80d4fd5ae214d40a3ee8a4b4e6ee4c6be058403a904b6a2a49d4e3507b1a853d6d0705f6ac2e2e777186ceeefc8b6739e774dd54ed154199c868fa6f11acc47338e232b07d9eb3d8a20c060c34bb1120eec6c8cbaccb5a2065e239498f853149def06a4e0d0c36249e0459067a783f0273ae79f1597cc629f405fb120fa8a6252cbc74a1a8178b6a993f80b2a40afe308bdba1ef17a3483ddd08618a0e4ef8477f30cc4b93732da4bf60cdfbfbc8518787acac6c85f4e91a839ed8fe3404c27a753b045791c29a15bb3afc00a202cd92448d67aae4b0743a204b675c28f47cd7ef24141c31aff0c0fb9cf8ccd84cabe0d8004ab3fb328e25d0febb0b559e0b11c336a7d00af7b33bfb84667ac58027c2ff1c60840f0f5486f89307023c12a16f00c6683b35bd8f03b04cd256602e7f5796431c056cb22a86ec043c3263225f070937565a91bc06807c3fff0cff41c16f0633bc9c82bce3f8b569ba1f4d996513dc782591fd3f428058bc782d1f0d47f3c4bd559c861e4a334bae75f28d79c0059db02461c221b7b72af2de7620af1ba2a9b68828473bb1c59c0cb946979c79188b87d4f5a4acce089933cf4af7c750cabe56a7b63c707a3d1a78751e3ea40b0df5b9302fc9af3f8c54fb7267acca18e627e025219bf8066aeddf1ac6187d66da323731f06aad205fec9a769c3e2c966fec706e5fc1fc3fd8e45bd9e8700e40a3c1896a883003a3e25aa928ad2115ab3982fbf5fb8819ceeb3c1301d21e4e6aef4d08ac120072036c9eb434c0f4090a9562244065d1c389e28fb588d13726d16cc11bdba9fac4817f05753173c7e94f1a55b367567fc426f191c6b89d63857c4144038e9eb157c622e05a1da10d9a05456b1db3b5dc67698b543c0cf347a54bb4fac9b401cab595bbb91a9d717df5b2a7797b05117703bb801f2562ef23e4235384dc6605c6fb1353d1a219ed02a8bc67de535381c1fecd33ebd37d5ecf29112ebb28a4b5c272951841737ef0967da67fbc6eab89ac90d83391500d810f53f044a39c82ce382763a0a96d91bed117adf1b6d4264894b2eafd674d2584eb3674169fb8bc01d2eea0fe38b256d4b0c195c84f6ef6f07c191d278032a85db1e4902075865387bd222e8a263914a4d5ece1ae7cb5b290c274ad23b805115db470e0f9ba77417214c284847f8782601de306aa6d0ccfd7dc88ea517dc0808712d2fa1351fc84724d32002175f8407e1d8b477b5ea4889dae06ddbfb5e75c59b3ae09050cd459e8736c6a1ad726926d22c7fce1f816cf21b4f53b82c0f64c0194ddfdbcdfd0d696ce7d8437bf1e316131e45429874178e9c2aaf4c9bc8cc1668667bc99e004e551c1037e26ef63009d6c171cd5ec10c42ad40ca5e1c7b6660c6a5782442fe1d06dab6347032670c72e312bf599fb2cc5ca09eaedffad63b4285a4a3039798acacaf562ba843137981d4c3b01326c476ef8724d2cba76aed09478bccf8a82809dc0a0bca57223f39a5527cacbb8019ba8ee7fc48d1c6940002d213bc713e5aea51d3ee3d49abe2ea24f894bdfcc6a28d6026e539a68df5870f26e5e87c833d895ffda806b44fba66ea29dbd0c7c0e46f70c8b1b1e3c3577ca5fcc887b95840ab78810b2727b73eaa85163bd446c2a4d392aacfc4ff9d05ff7ca93f334befdd3c0c9e5357440f7f26914eae3f852704726555af56e16fd78bb95e7ad26982d16df294089cdd423da2dce008cad27b793b9c2b82b8ed262fc574842b7cc179fa1128fdf6ac85ffc6528e3021dfefcbf35f2487166e466288960ea13547e7a7562328cc61d3dbea2c650b7d117b10e8dcd0b8cc9c295a557ae9668465e6abc5a10fd316a08666d2ef59f66121f3b8bf92d0a4a5078f037c33174aaa9180f6e558369e016e365368afafed145cf2d7de80cf63acf29e03ce7e3b38d86fd617f85262aa9f10f52d31a362c20b30426d7362ac81218f8a7ec77a40420862edd820362cdb52fbaa54476491b9f4cad36f84a379b7afdbdd52b8185475dc143b7fee36bbf4eec3081ce8152bf15ae9a9ea1cbccab9c52cf87f10178797be7e4f6494ff4b974885a16e40e3ef7d9202f29843db5b38e2f1e4882bc8033e17d0a91b9fc107c2d2e234566f9f469790f3e99c42e6ec2c6841bec88564866bcc1ffd9decc95cbc1c5f69da4855aeb91ce677d06bbee4bf436bae6fa4b632dd71e8db19112721ecd8f47e88509584b0280623356cd1f3bd13e10ea2e24940209be95646b6dca9bb5ae977c17a88a5fa5d59eb20a9b1a4d73ca03e2129a3e22591b7508a708b3d7eb9c8aad1174800000c88730cec6f41e9df71ec9c882ebcaa5dc838fa857d4ea68cebe6bcbdf12f92cea51e7de1dab514d79bcd60e8476763cdb13c11ca6f054da5dd157945a24d4d0a8a0102126ba6e2da287996126f1452e733562d27961cb861dbd1482986f1a1738f461059046014590a7974c5bd99dc4619bc4ae8ff43dc440a29abc6c64d1969ec176bb06363b282a7e1d15c5f1bffc6d43fd9698ee38a8fcf85ce47abf5d51a0b9524925f3eb26b6340c9b1c41efd23ff400aa1c9b188c7d038e09d479322e63ccb56824cc34d7f81e1a4a8260a08eba4d79d3f8e0ae1b3c0670e6934c770426bd9123a060130c1b92fea5a0087473f95419286ccda6139008c284d9eaf5f471cc849574143fa0ad323005c00ae9475e33448adfc42589a55e8bf8be2252ddc5180f89d6621e3ae1bff62ffc53bca244f9c03c61878c6730def361098347bb0c0891aa299c2a23", &(0x7f00000001c0), &(0x7f0000000440)="b15ace0a2095485163603df45b", &(0x7f0000000480)="12f9339a0c98fc4273e47fc4a98c269c8fa146157665685dfb31ff36ec0e957679e97298930fe52b6f3a8116cd1b41b3c292da56bf5a27c5842858ab4c9e6885066d960be5c863438b8a7783ea5d5cf43a4436", 0x20, r9}, 0x38) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r6, &(0x7f00000000c0)="fdebb8a59ab4fed7adb785d27f3eb9d16d22886eed35d161e3b726b8df6b1c4f2f5fa9d59814fa70faf86a8381aa45206d396de33edd7fc194d127ef437df01ddcd414f05fe9f08b79c7a32f7ad666137566d716738d948b97f3b6c640df5fb30ad7665c27a96c185d732b"}, 0x20) 03:48:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xa0024000}, 0x38) 03:48:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0c183efeff0002ffba88321400000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0c183efeff0002ffba88321400000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 03:48:35 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) [ 500.435154][T16451] FAULT_INJECTION: forcing a failure. [ 500.435154][T16451] name failslab, interval 1, probability 0, space 0, times 0 [ 500.472358][T16451] CPU: 0 PID: 16451 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 500.482439][T16451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 500.492325][T16451] Call Trace: [ 500.495447][T16451] [ 500.498228][T16451] dump_stack_lvl+0x151/0x1b7 [ 500.502745][T16451] ? bfq_pos_tree_add_move+0x43e/0x43e [ 500.508038][T16451] ? do_syscall_64+0x44/0xd0 [ 500.512466][T16451] dump_stack+0x15/0x17 [ 500.516453][T16451] should_fail+0x3c0/0x510 [ 500.520707][T16451] __should_failslab+0x9f/0xe0 [ 500.525306][T16451] should_failslab+0x9/0x20 [ 500.529732][T16451] kmem_cache_alloc+0x4f/0x2f0 [ 500.534331][T16451] ? anon_vma_clone+0xa1/0x4f0 [ 500.538932][T16451] anon_vma_clone+0xa1/0x4f0 [ 500.543363][T16451] anon_vma_fork+0x91/0x4f0 [ 500.547698][T16451] ? anon_vma_name+0x43/0x70 [ 500.552127][T16451] dup_mmap+0x750/0xea0 [ 500.556124][T16451] ? __delayed_free_task+0x20/0x20 [ 500.561071][T16451] ? mm_init+0x807/0x960 [ 500.565148][T16451] dup_mm+0x91/0x330 [ 500.568883][T16451] copy_mm+0x108/0x1b0 [ 500.572783][T16451] copy_process+0x1295/0x3250 [ 500.577300][T16451] ? proc_fail_nth_write+0x213/0x290 03:48:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x5, 0xfffd, 0x2, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000, 0xfffffffe}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18431c8700000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r7]}, 0x80) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r4, 0x30f3, 0x8}, 0xc) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async, rerun: 32) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff, r8, 0xffffffffffffffff, r12]}, 0x80) (async, rerun: 64) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000009c0)="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", &(0x7f00000001c0), &(0x7f0000000440)="b15ace0a2095485163603df45b", &(0x7f0000000480)="12f9339a0c98fc4273e47fc4a98c269c8fa146157665685dfb31ff36ec0e957679e97298930fe52b6f3a8116cd1b41b3c292da56bf5a27c5842858ab4c9e6885066d960be5c863438b8a7783ea5d5cf43a4436", 0x20, r9}, 0x38) (async, rerun: 64) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r6, &(0x7f00000000c0)="fdebb8a59ab4fed7adb785d27f3eb9d16d22886eed35d161e3b726b8df6b1c4f2f5fa9d59814fa70faf86a8381aa45206d396de33edd7fc194d127ef437df01ddcd414f05fe9f08b79c7a32f7ad666137566d716738d948b97f3b6c640df5fb30ad7665c27a96c185d732b"}, 0x20) [ 500.582422][T16451] ? proc_fail_nth_read+0x220/0x220 [ 500.587460][T16451] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 500.592402][T16451] ? vfs_write+0x9af/0x1050 [ 500.596826][T16451] ? vmacache_update+0xb7/0x120 [ 500.601516][T16451] kernel_clone+0x22d/0x990 [ 500.605859][T16451] ? file_end_write+0x1b0/0x1b0 [ 500.610539][T16451] ? __kasan_check_write+0x14/0x20 [ 500.615491][T16451] ? create_io_thread+0x1e0/0x1e0 [ 500.620350][T16451] ? __mutex_lock_slowpath+0x10/0x10 [ 500.625484][T16451] __x64_sys_clone+0x289/0x310 [ 500.630083][T16451] ? __do_sys_vfork+0x130/0x130 [ 500.634770][T16451] ? debug_smp_processor_id+0x17/0x20 [ 500.639967][T16451] do_syscall_64+0x44/0xd0 [ 500.644221][T16451] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 500.649944][T16451] RIP: 0033:0x7f8ab3ee50d9 [ 500.654201][T16451] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 500.673648][T16451] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 03:48:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xf2ffffff}, 0x38) 03:48:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xe}, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:36 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) [ 500.681886][T16451] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 500.689958][T16451] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 500.697767][T16451] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 500.705581][T16451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 500.713398][T16451] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 500.721206][T16451] 03:48:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r1, 0x200}, 0xc) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYRESOCT=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x80050000, &(0x7f0000000000)="f82cef20ebead1b1", 0x8, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="dd") 03:48:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xfeffffff}, 0x38) 03:48:36 executing program 4: syz_clone(0xc0800400, 0x0, 0xf0910e1b000000, 0x0, 0x0, 0x0) 03:48:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x5, 0xfffd, 0x2, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000, 0xfffffffe}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18431c8700000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r7]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r4, 0x30f3, 0x8}, 0xc) (async, rerun: 64) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff, r8, 0xffffffffffffffff, r12]}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000009c0)="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", &(0x7f00000001c0), &(0x7f0000000440)="b15ace0a2095485163603df45b", &(0x7f0000000480)="12f9339a0c98fc4273e47fc4a98c269c8fa146157665685dfb31ff36ec0e957679e97298930fe52b6f3a8116cd1b41b3c292da56bf5a27c5842858ab4c9e6885066d960be5c863438b8a7783ea5d5cf43a4436", 0x20, r9}, 0x38) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r6, &(0x7f00000000c0)="fdebb8a59ab4fed7adb785d27f3eb9d16d22886eed35d161e3b726b8df6b1c4f2f5fa9d59814fa70faf86a8381aa45206d396de33edd7fc194d127ef437df01ddcd414f05fe9f08b79c7a32f7ad666137566d716738d948b97f3b6c640df5fb30ad7665c27a96c185d732b"}, 0x20) [ 500.800515][T16475] FAULT_INJECTION: forcing a failure. [ 500.800515][T16475] name failslab, interval 1, probability 0, space 0, times 0 [ 500.837905][T16475] CPU: 0 PID: 16475 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 03:48:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r1, 0x200}, 0xc) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYRESOCT=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x80050000, &(0x7f0000000000)="f82cef20ebead1b1", 0x8, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="dd") openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r1, 0x200}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYRESOCT=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x80050000, &(0x7f0000000000)="f82cef20ebead1b1", 0x8, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="dd") (async) 03:48:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r1, 0x200}, 0xc) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYRESOCT=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x80050000, &(0x7f0000000000)="f82cef20ebead1b1", 0x8, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="dd") 03:48:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r5, 0x0, 0x6, &(0x7f0000000000)='.*\x9f[*\x00'}, 0x30) [ 500.847979][T16475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 500.857880][T16475] Call Trace: [ 500.861003][T16475] [ 500.863791][T16475] dump_stack_lvl+0x151/0x1b7 [ 500.868308][T16475] ? bfq_pos_tree_add_move+0x43e/0x43e [ 500.873761][T16475] dump_stack+0x15/0x17 [ 500.877753][T16475] should_fail+0x3c0/0x510 [ 500.882007][T16475] __should_failslab+0x9f/0xe0 [ 500.886609][T16475] should_failslab+0x9/0x20 [ 500.890955][T16475] kmem_cache_alloc+0x4f/0x2f0 [ 500.895545][T16475] ? anon_vma_clone+0xa1/0x4f0 [ 500.900144][T16475] anon_vma_clone+0xa1/0x4f0 [ 500.904573][T16475] anon_vma_fork+0x91/0x4f0 [ 500.908909][T16475] ? anon_vma_name+0x43/0x70 [ 500.913335][T16475] dup_mmap+0x750/0xea0 [ 500.917326][T16475] ? __delayed_free_task+0x20/0x20 [ 500.922273][T16475] ? mm_init+0x807/0x960 [ 500.926352][T16475] dup_mm+0x91/0x330 [ 500.930083][T16475] copy_mm+0x108/0x1b0 [ 500.933991][T16475] copy_process+0x1295/0x3250 [ 500.938504][T16475] ? proc_fail_nth_write+0x213/0x290 [ 500.943622][T16475] ? proc_fail_nth_read+0x220/0x220 [ 500.948658][T16475] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 500.953605][T16475] ? vfs_write+0x9af/0x1050 [ 500.957945][T16475] ? vmacache_update+0xb7/0x120 [ 500.962633][T16475] kernel_clone+0x22d/0x990 [ 500.966972][T16475] ? file_end_write+0x1b0/0x1b0 [ 500.971657][T16475] ? __kasan_check_write+0x14/0x20 [ 500.976605][T16475] ? create_io_thread+0x1e0/0x1e0 [ 500.981466][T16475] ? __mutex_lock_slowpath+0x10/0x10 [ 500.986588][T16475] __x64_sys_clone+0x289/0x310 [ 500.991204][T16475] ? __do_sys_vfork+0x130/0x130 [ 500.995875][T16475] ? debug_smp_processor_id+0x17/0x20 [ 501.001087][T16475] do_syscall_64+0x44/0xd0 [ 501.005527][T16475] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 501.011255][T16475] RIP: 0033:0x7f8ab3ee50d9 [ 501.015597][T16475] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 501.035126][T16475] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 501.043369][T16475] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 03:48:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xe}, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xff600000}, 0x38) 03:48:36 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) [ 501.051179][T16475] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 501.058991][T16475] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 501.066802][T16475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 501.074620][T16475] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 501.082440][T16475] 03:48:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x4, 0x2, 0x83fd, 0x3f, 0x12, r1, 0xffffffff, '\x00', 0x0, r0, 0x4, 0x2, 0x1}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff, r8, 0xffffffffffffffff, r12]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x13, 0x6, &(0x7f0000000000)=@raw=[@generic={0xfe, 0x4, 0x1, 0x6, 0x9}, @jmp={0x5, 0x1, 0xb, 0xa, 0x0, 0xfffffffffffffff4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x2d}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000040)='GPL\x00', 0x0, 0x6d, &(0x7f0000000440)=""/109, 0x41000, 0x5, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0x5, 0xfffffffd, 0x45c0}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r1, r8, r2, r7, r1, r8]}, 0x80) [ 501.146802][T16510] FAULT_INJECTION: forcing a failure. [ 501.146802][T16510] name failslab, interval 1, probability 0, space 0, times 0 [ 501.162654][T16510] CPU: 0 PID: 16510 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 501.172808][T16510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 501.182702][T16510] Call Trace: [ 501.185823][T16510] [ 501.188602][T16510] dump_stack_lvl+0x151/0x1b7 [ 501.193119][T16510] ? bfq_pos_tree_add_move+0x43e/0x43e [ 501.198415][T16510] dump_stack+0x15/0x17 [ 501.202401][T16510] should_fail+0x3c0/0x510 [ 501.206656][T16510] __should_failslab+0x9f/0xe0 [ 501.211255][T16510] should_failslab+0x9/0x20 [ 501.215595][T16510] kmem_cache_alloc+0x4f/0x2f0 [ 501.220211][T16510] ? anon_vma_clone+0xa1/0x4f0 [ 501.224792][T16510] anon_vma_clone+0xa1/0x4f0 [ 501.229221][T16510] anon_vma_fork+0x91/0x4f0 [ 501.233564][T16510] ? anon_vma_name+0x4c/0x70 [ 501.237989][T16510] dup_mmap+0x750/0xea0 [ 501.241980][T16510] ? __delayed_free_task+0x20/0x20 [ 501.246931][T16510] ? mm_init+0x807/0x960 [ 501.251005][T16510] dup_mm+0x91/0x330 [ 501.254737][T16510] copy_mm+0x108/0x1b0 [ 501.258648][T16510] copy_process+0x1295/0x3250 [ 501.263251][T16510] ? proc_fail_nth_write+0x213/0x290 [ 501.268373][T16510] ? proc_fail_nth_read+0x220/0x220 [ 501.273418][T16510] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 501.278353][T16510] ? vfs_write+0x9af/0x1050 [ 501.282694][T16510] ? vmacache_update+0xb7/0x120 [ 501.287381][T16510] kernel_clone+0x22d/0x990 [ 501.291724][T16510] ? file_end_write+0x1b0/0x1b0 [ 501.296493][T16510] ? __kasan_check_write+0x14/0x20 [ 501.301442][T16510] ? create_io_thread+0x1e0/0x1e0 [ 501.306308][T16510] ? __mutex_lock_slowpath+0x10/0x10 [ 501.311519][T16510] __x64_sys_clone+0x289/0x310 [ 501.316114][T16510] ? __do_sys_vfork+0x130/0x130 [ 501.320796][T16510] ? debug_smp_processor_id+0x17/0x20 [ 501.326004][T16510] do_syscall_64+0x44/0xd0 [ 501.330256][T16510] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 501.335993][T16510] RIP: 0033:0x7f8ab3ee50d9 [ 501.340238][T16510] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 501.359678][T16510] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 501.367924][T16510] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 501.375743][T16510] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 501.383553][T16510] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 03:48:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xffff0200}, 0x38) 03:48:36 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) 03:48:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xe}, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xe}, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) [ 501.391361][T16510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 501.399171][T16510] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 501.406991][T16510] [ 501.491804][T16529] FAULT_INJECTION: forcing a failure. [ 501.491804][T16529] name failslab, interval 1, probability 0, space 0, times 0 [ 501.505186][T16529] CPU: 0 PID: 16529 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 501.515258][T16529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 501.525152][T16529] Call Trace: [ 501.528272][T16529] [ 501.531050][T16529] dump_stack_lvl+0x151/0x1b7 [ 501.535566][T16529] ? bfq_pos_tree_add_move+0x43e/0x43e [ 501.540858][T16529] dump_stack+0x15/0x17 [ 501.544850][T16529] should_fail+0x3c0/0x510 [ 501.549110][T16529] __should_failslab+0x9f/0xe0 [ 501.553705][T16529] should_failslab+0x9/0x20 [ 501.558045][T16529] kmem_cache_alloc+0x4f/0x2f0 [ 501.562648][T16529] ? anon_vma_fork+0x1b9/0x4f0 [ 501.567249][T16529] anon_vma_fork+0x1b9/0x4f0 [ 501.571676][T16529] dup_mmap+0x750/0xea0 [ 501.576972][T16529] ? __delayed_free_task+0x20/0x20 [ 501.581915][T16529] ? mm_init+0x807/0x960 [ 501.585994][T16529] dup_mm+0x91/0x330 [ 501.589727][T16529] copy_mm+0x108/0x1b0 [ 501.593632][T16529] copy_process+0x1295/0x3250 [ 501.598150][T16529] ? proc_fail_nth_write+0x213/0x290 [ 501.603268][T16529] ? proc_fail_nth_read+0x220/0x220 [ 501.608302][T16529] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 501.613246][T16529] ? vfs_write+0x9af/0x1050 [ 501.617585][T16529] ? vmacache_update+0xb7/0x120 [ 501.622279][T16529] kernel_clone+0x22d/0x990 [ 501.626616][T16529] ? file_end_write+0x1b0/0x1b0 [ 501.631304][T16529] ? __kasan_check_write+0x14/0x20 [ 501.636249][T16529] ? create_io_thread+0x1e0/0x1e0 [ 501.641147][T16529] ? __mutex_lock_slowpath+0x10/0x10 [ 501.646241][T16529] __x64_sys_clone+0x289/0x310 [ 501.650832][T16529] ? __do_sys_vfork+0x130/0x130 [ 501.655518][T16529] ? debug_smp_processor_id+0x17/0x20 [ 501.660732][T16529] do_syscall_64+0x44/0xd0 [ 501.664979][T16529] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 501.670706][T16529] RIP: 0033:0x7f8ab3ee50d9 [ 501.674958][T16529] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 501.694660][T16529] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 501.702904][T16529] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 501.710720][T16529] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 501.718530][T16529] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 501.726343][T16529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 501.734150][T16529] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 03:48:37 executing program 4: syz_clone(0xc0800400, 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0) 03:48:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r5, 0x0, 0x6, &(0x7f0000000000)='.*\x9f[*\x00'}, 0x30) 03:48:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xfffffff2}, 0x38) 03:48:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x4, 0x2, 0x83fd, 0x3f, 0x12, r1, 0xffffffff, '\x00', 0x0, r0, 0x4, 0x2, 0x1}, 0x48) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff, r8, 0xffffffffffffffff, r12]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x13, 0x6, &(0x7f0000000000)=@raw=[@generic={0xfe, 0x4, 0x1, 0x6, 0x9}, @jmp={0x5, 0x1, 0xb, 0xa, 0x0, 0xfffffffffffffff4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x2d}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000040)='GPL\x00', 0x0, 0x6d, &(0x7f0000000440)=""/109, 0x41000, 0x5, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0x5, 0xfffffffd, 0x45c0}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r1, r8, r2, r7, r1, r8]}, 0x80) 03:48:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba008466ab68868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:37 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) [ 501.741968][T16529] 03:48:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x4, 0x2, 0x83fd, 0x3f, 0x12, r1, 0xffffffff, '\x00', 0x0, r0, 0x4, 0x2, 0x1}, 0x48) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r7]}, 0x80) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 32) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r9, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r10, 0x0, r9, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4004662b, &(0x7f00000005c0)=0x1) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r12, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r12, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r9, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff, r8, 0xffffffffffffffff, r12]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x13, 0x6, &(0x7f0000000000)=@raw=[@generic={0xfe, 0x4, 0x1, 0x6, 0x9}, @jmp={0x5, 0x1, 0xb, 0xa, 0x0, 0xfffffffffffffff4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x2d}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000040)='GPL\x00', 0x0, 0x6d, &(0x7f0000000440)=""/109, 0x41000, 0x5, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0x5, 0xfffffffd, 0x45c0}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r1, r8, r2, r7, r1, r8]}, 0x80) 03:48:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xfffffffe}, 0x38) [ 501.811806][T16561] FAULT_INJECTION: forcing a failure. [ 501.811806][T16561] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 501.839843][T16561] CPU: 0 PID: 16561 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 501.849925][T16561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 501.859818][T16561] Call Trace: [ 501.862942][T16561] [ 501.865718][T16561] dump_stack_lvl+0x151/0x1b7 [ 501.870233][T16561] ? bfq_pos_tree_add_move+0x43e/0x43e [ 501.875531][T16561] dump_stack+0x15/0x17 [ 501.879517][T16561] should_fail+0x3c0/0x510 [ 501.883773][T16561] should_fail_alloc_page+0x58/0x70 [ 501.888803][T16561] __alloc_pages+0x1de/0x7c0 [ 501.893231][T16561] ? __count_vm_events+0x30/0x30 [ 501.898008][T16561] pte_alloc_one+0x73/0x1b0 [ 501.902345][T16561] ? pfn_modify_allowed+0x2e0/0x2e0 [ 501.907380][T16561] __pte_alloc+0x86/0x350 [ 501.911547][T16561] ? free_pgtables+0x210/0x210 [ 501.916143][T16561] ? _raw_spin_lock+0xa3/0x1b0 [ 501.920751][T16561] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 501.925955][T16561] ? unwind_get_return_address+0x4c/0x90 [ 501.931601][T16561] copy_pte_range+0x1b1f/0x20b0 [ 501.936286][T16561] ? stack_trace_save+0x12d/0x1f0 [ 501.941145][T16561] ? anon_vma_clone+0xa1/0x4f0 [ 501.945743][T16561] ? __kunmap_atomic+0x80/0x80 [ 501.950345][T16561] ? dup_mmap+0x750/0xea0 [ 501.954511][T16561] ? dup_mm+0x91/0x330 [ 501.958410][T16561] ? copy_mm+0x108/0x1b0 [ 501.962491][T16561] ? copy_process+0x1295/0x3250 [ 501.967180][T16561] ? kernel_clone+0x22d/0x990 [ 501.971692][T16561] ? __x64_sys_clone+0x289/0x310 [ 501.976463][T16561] ? do_syscall_64+0x44/0xd0 [ 501.980979][T16561] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 501.986888][T16561] copy_page_range+0xc1e/0x1090 [ 501.991574][T16561] ? pfn_valid+0x1e0/0x1e0 [ 501.995825][T16561] dup_mmap+0x99f/0xea0 [ 501.999815][T16561] ? __delayed_free_task+0x20/0x20 [ 502.004848][T16561] ? mm_init+0x807/0x960 [ 502.008926][T16561] dup_mm+0x91/0x330 [ 502.012660][T16561] copy_mm+0x108/0x1b0 [ 502.016572][T16561] copy_process+0x1295/0x3250 [ 502.021086][T16561] ? proc_fail_nth_write+0x213/0x290 [ 502.026209][T16561] ? proc_fail_nth_read+0x220/0x220 [ 502.031233][T16561] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 502.036176][T16561] ? vfs_write+0x9af/0x1050 [ 502.040519][T16561] ? vmacache_update+0xb7/0x120 [ 502.045206][T16561] kernel_clone+0x22d/0x990 [ 502.049543][T16561] ? file_end_write+0x1b0/0x1b0 [ 502.054231][T16561] ? __kasan_check_write+0x14/0x20 [ 502.059182][T16561] ? create_io_thread+0x1e0/0x1e0 [ 502.064040][T16561] ? __mutex_lock_slowpath+0x10/0x10 [ 502.069161][T16561] __x64_sys_clone+0x289/0x310 [ 502.073849][T16561] ? __do_sys_vfork+0x130/0x130 [ 502.078536][T16561] ? debug_smp_processor_id+0x17/0x20 [ 502.084186][T16561] do_syscall_64+0x44/0xd0 [ 502.088429][T16561] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 502.094167][T16561] RIP: 0033:0x7f8ab3ee50d9 03:48:37 executing program 4: syz_clone(0xc0800400, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 03:48:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r3, &(0x7f00000000c0)="b69470b54351950a9a6711974bd8d305692b1ed564e708cc5faeac3e99a5561b26585099cbaefc7b9d88671367a75958ca5ff32ff72086f991f20274b89c39fe0059560ba67ac220514e4e95cae0a31663723bd7bf3ad6aa0200000000000000868c4934325635d94a8248af7b748bb183186d371264a1920f2d67c199f4ca31b910e52ad21a757c90a2602106d12f7f5f", &(0x7f0000000440)=""/122}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) [ 502.098409][T16561] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 502.118028][T16561] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 502.126276][T16561] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 502.134084][T16561] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 502.141891][T16561] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 502.149705][T16561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:48:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (rerun: 32) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async, rerun: 64) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba008466ab68868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r5, 0x0, 0x6, &(0x7f0000000000)='.*\x9f[*\x00'}, 0x30) 03:48:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x2000000000}, 0x38) 03:48:37 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) [ 502.157528][T16561] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 502.165333][T16561] 03:48:37 executing program 4: syz_clone(0xc0800400, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 03:48:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x2100000000}, 0x38) 03:48:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r3, &(0x7f00000000c0)="b69470b54351950a9a6711974bd8d305692b1ed564e708cc5faeac3e99a5561b26585099cbaefc7b9d88671367a75958ca5ff32ff72086f991f20274b89c39fe0059560ba67ac220514e4e95cae0a31663723bd7bf3ad6aa0200000000000000868c4934325635d94a8248af7b748bb183186d371264a1920f2d67c199f4ca31b910e52ad21a757c90a2602106d12f7f5f", &(0x7f0000000440)=""/122}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r3, &(0x7f00000000c0)="b69470b54351950a9a6711974bd8d305692b1ed564e708cc5faeac3e99a5561b26585099cbaefc7b9d88671367a75958ca5ff32ff72086f991f20274b89c39fe0059560ba67ac220514e4e95cae0a31663723bd7bf3ad6aa0200000000000000868c4934325635d94a8248af7b748bb183186d371264a1920f2d67c199f4ca31b910e52ad21a757c90a2602106d12f7f5f", &(0x7f0000000440)=""/122}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) 03:48:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008521000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c299047f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x10}, 0x10) openat$cgroup_ro(r2, &(0x7f0000000500)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f72}, [@map_val={0x18, 0x3, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x3}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0x1, 0x3, 0xb, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @func, @call={0x85, 0x0, 0x0, 0x1b}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x58, &(0x7f0000000180)=""/88, 0x41000, 0x20, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x5, 0x20, 0x260}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r7, 0xffffffffffffffff, 0xffffffffffffffff, r12]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba008466ab68868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba008466ab68868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) [ 502.262643][T16594] FAULT_INJECTION: forcing a failure. [ 502.262643][T16594] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 502.281296][T16594] CPU: 0 PID: 16594 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 502.291370][T16594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 502.301267][T16594] Call Trace: [ 502.304400][T16594] [ 502.307169][T16594] dump_stack_lvl+0x151/0x1b7 [ 502.311686][T16594] ? bfq_pos_tree_add_move+0x43e/0x43e [ 502.316979][T16594] dump_stack+0x15/0x17 [ 502.320965][T16594] should_fail+0x3c0/0x510 [ 502.325220][T16594] should_fail_alloc_page+0x58/0x70 [ 502.330264][T16594] __alloc_pages+0x1de/0x7c0 [ 502.334680][T16594] ? __count_vm_events+0x30/0x30 [ 502.339450][T16594] ? __this_cpu_preempt_check+0x13/0x20 [ 502.344838][T16594] ? __mod_node_page_state+0xac/0xf0 [ 502.349954][T16594] ? __mod_lruvec_page_state+0x15f/0x1c0 [ 502.355421][T16594] pte_alloc_one+0x73/0x1b0 [ 502.359762][T16594] ? pfn_modify_allowed+0x2e0/0x2e0 [ 502.364798][T16594] __pte_alloc+0x86/0x350 [ 502.368962][T16594] ? free_pgtables+0x210/0x210 [ 502.373566][T16594] ? _raw_spin_lock+0xa3/0x1b0 [ 502.378190][T16594] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 502.383368][T16594] ? unwind_get_return_address+0x4c/0x90 [ 502.388838][T16594] copy_pte_range+0x1b1f/0x20b0 [ 502.393526][T16594] ? stack_trace_save+0x12d/0x1f0 [ 502.398387][T16594] ? anon_vma_clone+0xa1/0x4f0 [ 502.403073][T16594] ? __kunmap_atomic+0x80/0x80 [ 502.407669][T16594] ? dup_mmap+0x750/0xea0 [ 502.411835][T16594] ? copy_mm+0x108/0x1b0 [ 502.415920][T16594] ? copy_process+0x1295/0x3250 [ 502.420687][T16594] ? kernel_clone+0x22d/0x990 [ 502.425221][T16594] ? __x64_sys_clone+0x289/0x310 [ 502.429980][T16594] ? do_syscall_64+0x44/0xd0 [ 502.434401][T16594] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 502.440317][T16594] copy_page_range+0xc1e/0x1090 [ 502.444997][T16594] ? pfn_valid+0x1e0/0x1e0 [ 502.449245][T16594] dup_mmap+0x99f/0xea0 [ 502.453241][T16594] ? __delayed_free_task+0x20/0x20 [ 502.458184][T16594] ? mm_init+0x807/0x960 [ 502.462264][T16594] dup_mm+0x91/0x330 [ 502.465994][T16594] copy_mm+0x108/0x1b0 [ 502.469903][T16594] copy_process+0x1295/0x3250 [ 502.474417][T16594] ? proc_fail_nth_write+0x213/0x290 [ 502.479534][T16594] ? proc_fail_nth_read+0x220/0x220 [ 502.484569][T16594] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 502.489524][T16594] ? vfs_write+0x9af/0x1050 [ 502.494032][T16594] ? vmacache_update+0xb7/0x120 [ 502.498718][T16594] kernel_clone+0x22d/0x990 [ 502.503057][T16594] ? file_end_write+0x1b0/0x1b0 [ 502.507741][T16594] ? __kasan_check_write+0x14/0x20 [ 502.512775][T16594] ? create_io_thread+0x1e0/0x1e0 [ 502.517638][T16594] ? __mutex_lock_slowpath+0x10/0x10 [ 502.522759][T16594] __x64_sys_clone+0x289/0x310 [ 502.527362][T16594] ? __do_sys_vfork+0x130/0x130 [ 502.532049][T16594] ? debug_smp_processor_id+0x17/0x20 [ 502.537254][T16594] do_syscall_64+0x44/0xd0 [ 502.541506][T16594] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 502.547242][T16594] RIP: 0033:0x7f8ab3ee50d9 [ 502.551488][T16594] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 502.570932][T16594] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 502.579173][T16594] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 502.587358][T16594] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 502.595167][T16594] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 502.603058][T16594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:48:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x60ffffffffff}, 0x38) 03:48:38 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) [ 502.610831][T16594] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 502.618894][T16594] 03:48:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r3, &(0x7f00000000c0)="b69470b54351950a9a6711974bd8d305692b1ed564e708cc5faeac3e99a5561b26585099cbaefc7b9d88671367a75958ca5ff32ff72086f991f20274b89c39fe0059560ba67ac220514e4e95cae0a31663723bd7bf3ad6aa0200000000000000868c4934325635d94a8248af7b748bb183186d371264a1920f2d67c199f4ca31b910e52ad21a757c90a2602106d12f7f5f", &(0x7f0000000440)=""/122}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4]}, 0x80) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r3, &(0x7f00000000c0)="b69470b54351950a9a6711974bd8d305692b1ed564e708cc5faeac3e99a5561b26585099cbaefc7b9d88671367a75958ca5ff32ff72086f991f20274b89c39fe0059560ba67ac220514e4e95cae0a31663723bd7bf3ad6aa0200000000000000868c4934325635d94a8248af7b748bb183186d371264a1920f2d67c199f4ca31b910e52ad21a757c90a2602106d12f7f5f", &(0x7f0000000440)=""/122}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) 03:48:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x80, 0x40, 0x2, 0x7, 0x20, 0x0, 0x8, 0x1501c, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x48421, 0x8000, 0x9, 0x4, 0x9, 0x7, 0x8001, 0x0, 0x3, 0x0, 0x2}, r2, 0x8, 0xffffffffffffffff, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x7f1811d96000}, 0x38) 03:48:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 32) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008521000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c299047f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) (async) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x10}, 0x10) openat$cgroup_ro(r2, &(0x7f0000000500)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f72}, [@map_val={0x18, 0x3, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x3}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0x1, 0x3, 0xb, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @func, @call={0x85, 0x0, 0x0, 0x1b}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x58, &(0x7f0000000180)=""/88, 0x41000, 0x20, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x5, 0x20, 0x260}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r7, 0xffffffffffffffff, 0xffffffffffffffff, r12]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x7f1811f96000}, 0x38) [ 502.755526][T16640] FAULT_INJECTION: forcing a failure. [ 502.755526][T16640] name failslab, interval 1, probability 0, space 0, times 0 [ 502.770030][T16640] CPU: 0 PID: 16640 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 502.780095][T16640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 502.790075][T16640] Call Trace: [ 502.793202][T16640] [ 502.795983][T16640] dump_stack_lvl+0x151/0x1b7 [ 502.800491][T16640] ? bfq_pos_tree_add_move+0x43e/0x43e [ 502.805785][T16640] dump_stack+0x15/0x17 [ 502.809867][T16640] should_fail+0x3c0/0x510 [ 502.814120][T16640] __should_failslab+0x9f/0xe0 [ 502.818717][T16640] should_failslab+0x9/0x20 [ 502.823081][T16640] kmem_cache_alloc+0x4f/0x2f0 [ 502.827659][T16640] ? vm_area_dup+0x26/0x1d0 [ 502.831997][T16640] ? __kasan_check_read+0x11/0x20 [ 502.836856][T16640] vm_area_dup+0x26/0x1d0 [ 502.841034][T16640] dup_mmap+0x6b8/0xea0 [ 502.845452][T16640] ? __delayed_free_task+0x20/0x20 [ 502.850406][T16640] ? mm_init+0x807/0x960 [ 502.854486][T16640] dup_mm+0x91/0x330 [ 502.858208][T16640] copy_mm+0x108/0x1b0 [ 502.862116][T16640] copy_process+0x1295/0x3250 [ 502.866631][T16640] ? proc_fail_nth_write+0x213/0x290 [ 502.871782][T16640] ? proc_fail_nth_read+0x220/0x220 [ 502.876785][T16640] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 502.881728][T16640] ? vfs_write+0x9af/0x1050 [ 502.886072][T16640] ? vmacache_update+0xb7/0x120 [ 502.890757][T16640] kernel_clone+0x22d/0x990 [ 502.895099][T16640] ? file_end_write+0x1b0/0x1b0 [ 502.899872][T16640] ? __kasan_check_write+0x14/0x20 [ 502.904816][T16640] ? create_io_thread+0x1e0/0x1e0 [ 502.909676][T16640] ? __mutex_lock_slowpath+0x10/0x10 [ 502.914801][T16640] __x64_sys_clone+0x289/0x310 [ 502.919400][T16640] ? __do_sys_vfork+0x130/0x130 [ 502.924089][T16640] ? debug_smp_processor_id+0x17/0x20 [ 502.929296][T16640] do_syscall_64+0x44/0xd0 [ 502.933547][T16640] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 502.939273][T16640] RIP: 0033:0x7f8ab3ee50d9 [ 502.943530][T16640] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 502.962968][T16640] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 502.971214][T16640] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 502.979027][T16640] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 502.986835][T16640] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 502.994648][T16640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 503.002459][T16640] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 503.010275][T16640] 03:48:38 executing program 4: syz_clone(0xc0800400, 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 03:48:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) write$cgroup_int(r0, &(0x7f00000000c0)=0x1, 0x12) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0xd5c1, 0x0, 0x1000, 0xffffffffffffffff, 0x7, '\x00', 0x0, r1, 0x5, 0x1, 0x1, 0xc}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:38 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 75) 03:48:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008521000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c299047f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x10}, 0x10) openat$cgroup_ro(r2, &(0x7f0000000500)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f72}, [@map_val={0x18, 0x3, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x3}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0x1, 0x3, 0xb, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @func, @call={0x85, 0x0, 0x0, 0x1b}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x58, &(0x7f0000000180)=""/88, 0x41000, 0x20, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x5, 0x20, 0x260}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r7, 0xffffffffffffffff, 0xffffffffffffffff, r12]}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x2ffff00000000}, 0x38) 03:48:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x80, 0x40, 0x2, 0x7, 0x20, 0x0, 0x8, 0x1501c, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x48421, 0x8000, 0x9, 0x4, 0x9, 0x7, 0x8001, 0x0, 0x3, 0x0, 0x2}, r2, 0x8, 0xffffffffffffffff, 0xc) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (rerun: 64) 03:48:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x20000000000000}, 0x38) [ 503.192527][T16679] FAULT_INJECTION: forcing a failure. [ 503.192527][T16679] name failslab, interval 1, probability 0, space 0, times 0 [ 503.207911][T16679] CPU: 0 PID: 16679 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 503.218067][T16679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 503.227977][T16679] Call Trace: [ 503.231174][T16679] [ 503.233948][T16679] dump_stack_lvl+0x151/0x1b7 [ 503.238472][T16679] ? bfq_pos_tree_add_move+0x43e/0x43e [ 503.243759][T16679] ? do_syscall_64+0x44/0xd0 [ 503.248190][T16679] dump_stack+0x15/0x17 [ 503.252180][T16679] should_fail+0x3c0/0x510 [ 503.256433][T16679] __should_failslab+0x9f/0xe0 [ 503.261031][T16679] should_failslab+0x9/0x20 [ 503.265369][T16679] kmem_cache_alloc+0x4f/0x2f0 [ 503.269974][T16679] ? anon_vma_clone+0xa1/0x4f0 [ 503.274573][T16679] anon_vma_clone+0xa1/0x4f0 [ 503.278995][T16679] anon_vma_fork+0x91/0x4f0 [ 503.283337][T16679] ? anon_vma_name+0x43/0x70 [ 503.287767][T16679] dup_mmap+0x750/0xea0 03:48:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async, rerun: 32) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async, rerun: 64) perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x80, 0x40, 0x2, 0x7, 0x20, 0x0, 0x8, 0x1501c, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x48421, 0x8000, 0x9, 0x4, 0x9, 0x7, 0x8001, 0x0, 0x3, 0x0, 0x2}, r2, 0x8, 0xffffffffffffffff, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r8, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r8, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r5, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r4, 0xffffffffffffffff, r8]}, 0x80) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x9, 0xff, 0x20, 0x7, 0x0, 0x7, 0x200, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000100), 0x8}, 0x442, 0x9, 0x5, 0x27f5191140306450, 0xd72, 0xffff0001, 0x4, 0x0, 0x8, 0x0, 0x100000000}, r3, 0x6, r7, 0xa) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$TUNGETFILTER(r9, 0x801054db, &(0x7f0000000200)=""/71) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 503.291766][T16679] ? __delayed_free_task+0x20/0x20 [ 503.296702][T16679] ? mm_init+0x807/0x960 [ 503.300786][T16679] dup_mm+0x91/0x330 [ 503.304513][T16679] copy_mm+0x108/0x1b0 [ 503.308416][T16679] copy_process+0x1295/0x3250 [ 503.312943][T16679] ? proc_fail_nth_write+0x213/0x290 [ 503.318067][T16679] ? proc_fail_nth_read+0x220/0x220 [ 503.323090][T16679] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 503.328037][T16679] ? vfs_write+0x9af/0x1050 [ 503.332376][T16679] ? vmacache_update+0xb7/0x120 [ 503.337066][T16679] kernel_clone+0x22d/0x990 [ 503.341401][T16679] ? file_end_write+0x1b0/0x1b0 [ 503.346089][T16679] ? __kasan_check_write+0x14/0x20 [ 503.351036][T16679] ? create_io_thread+0x1e0/0x1e0 [ 503.355898][T16679] ? __mutex_lock_slowpath+0x10/0x10 [ 503.361019][T16679] __x64_sys_clone+0x289/0x310 [ 503.365618][T16679] ? __do_sys_vfork+0x130/0x130 [ 503.370307][T16679] ? debug_smp_processor_id+0x17/0x20 [ 503.375512][T16679] do_syscall_64+0x44/0xd0 [ 503.379762][T16679] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 503.385492][T16679] RIP: 0033:0x7f8ab3ee50d9 [ 503.389842][T16679] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 503.409285][T16679] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 503.417528][T16679] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 503.425341][T16679] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 503.433150][T16679] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 03:48:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) write$cgroup_int(r0, &(0x7f00000000c0)=0x1, 0x12) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0xd5c1, 0x0, 0x1000, 0xffffffffffffffff, 0x7, '\x00', 0x0, r1, 0x5, 0x1, 0x1, 0xc}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_subtree(r4, &(0x7f0000000140), 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) write$cgroup_int(r0, &(0x7f00000000c0)=0x1, 0x12) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0xd5c1, 0x0, 0x1000, 0xffffffffffffffff, 0x7, '\x00', 0x0, r1, 0x5, 0x1, 0x1, 0xc}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) 03:48:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x4002a0ffffffff}, 0x38) 03:48:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 503.440963][T16679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 503.448776][T16679] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 503.456589][T16679] 03:48:39 executing program 4: syz_clone(0xc0800400, 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 03:48:39 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 76) 03:48:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) r3 = getpid() (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r8, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r8, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r5, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r4, 0xffffffffffffffff, r8]}, 0x80) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x9, 0xff, 0x20, 0x7, 0x0, 0x7, 0x200, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000100), 0x8}, 0x442, 0x9, 0x5, 0x27f5191140306450, 0xd72, 0xffff0001, 0x4, 0x0, 0x8, 0x0, 0x100000000}, r3, 0x6, r7, 0xa) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$TUNGETFILTER(r9, 0x801054db, &(0x7f0000000200)=""/71) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='mm_page_alloc\x00', r0}, 0x10) (async, rerun: 64) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 03:48:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x60d911187f0000}, 0x38) 03:48:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000140), 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) write$cgroup_int(r0, &(0x7f00000000c0)=0x1, 0x12) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0xd5c1, 0x0, 0x1000, 0xffffffffffffffff, 0x7, '\x00', 0x0, r1, 0x5, 0x1, 0x1, 0xc}, 0x48) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) [ 503.747821][T16740] FAULT_INJECTION: forcing a failure. [ 503.747821][T16740] name failslab, interval 1, probability 0, space 0, times 0 [ 503.763234][T16740] CPU: 1 PID: 16740 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 503.773307][T16740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 503.783204][T16740] Call Trace: [ 503.786321][T16740] [ 503.789097][T16740] dump_stack_lvl+0x151/0x1b7 [ 503.793611][T16740] ? bfq_pos_tree_add_move+0x43e/0x43e [ 503.798908][T16740] dump_stack+0x15/0x17 [ 503.802898][T16740] should_fail+0x3c0/0x510 [ 503.807154][T16740] __should_failslab+0x9f/0xe0 [ 503.811750][T16740] should_failslab+0x9/0x20 [ 503.816121][T16740] kmem_cache_alloc+0x4f/0x2f0 [ 503.820690][T16740] ? anon_vma_clone+0xa1/0x4f0 [ 503.825291][T16740] anon_vma_clone+0xa1/0x4f0 [ 503.829718][T16740] anon_vma_fork+0x91/0x4f0 [ 503.834057][T16740] ? anon_vma_name+0x43/0x70 [ 503.838483][T16740] dup_mmap+0x750/0xea0 [ 503.842486][T16740] ? __delayed_free_task+0x20/0x20 [ 503.847425][T16740] ? mm_init+0x807/0x960 [ 503.851502][T16740] dup_mm+0x91/0x330 [ 503.855235][T16740] copy_mm+0x108/0x1b0 [ 503.859160][T16740] copy_process+0x1295/0x3250 [ 503.863654][T16740] ? proc_fail_nth_write+0x213/0x290 [ 503.868773][T16740] ? proc_fail_nth_read+0x220/0x220 [ 503.873807][T16740] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 503.878756][T16740] ? vfs_write+0x9af/0x1050 [ 503.883108][T16740] ? vmacache_update+0xb7/0x120 [ 503.887782][T16740] kernel_clone+0x22d/0x990 [ 503.892320][T16740] ? file_end_write+0x1b0/0x1b0 [ 503.897003][T16740] ? __kasan_check_write+0x14/0x20 [ 503.901953][T16740] ? create_io_thread+0x1e0/0x1e0 [ 503.906812][T16740] ? __mutex_lock_slowpath+0x10/0x10 [ 503.911933][T16740] __x64_sys_clone+0x289/0x310 [ 503.916540][T16740] ? __do_sys_vfork+0x130/0x130 [ 503.921221][T16740] ? debug_smp_processor_id+0x17/0x20 [ 503.926430][T16740] do_syscall_64+0x44/0xd0 [ 503.930680][T16740] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 503.936410][T16740] RIP: 0033:0x7f8ab3ee50d9 [ 503.940662][T16740] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 503.960197][T16740] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 503.968435][T16740] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 503.976332][T16740] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 503.984144][T16740] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 03:48:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (rerun: 32) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async, rerun: 32) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (rerun: 32) r3 = getpid() (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async, rerun: 64) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r8, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r8, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r5, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r4, 0xffffffffffffffff, r8]}, 0x80) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x9, 0xff, 0x20, 0x7, 0x0, 0x7, 0x200, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000100), 0x8}, 0x442, 0x9, 0x5, 0x27f5191140306450, 0xd72, 0xffff0001, 0x4, 0x0, 0x8, 0x0, 0x100000000}, r3, 0x6, r7, 0xa) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$TUNGETFILTER(r9, 0x801054db, &(0x7f0000000200)=""/71) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:39 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 77) [ 503.991961][T16740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 503.999768][T16740] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 504.007669][T16740] 03:48:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0x17, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x60f911187f0000}, 0x38) 03:48:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xf0ff1f00000000}, 0x38) [ 504.077660][T16780] FAULT_INJECTION: forcing a failure. [ 504.077660][T16780] name failslab, interval 1, probability 0, space 0, times 0 [ 504.126669][T16780] CPU: 0 PID: 16780 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 504.136753][T16780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 504.146647][T16780] Call Trace: [ 504.149770][T16780] [ 504.152548][T16780] dump_stack_lvl+0x151/0x1b7 [ 504.157060][T16780] ? bfq_pos_tree_add_move+0x43e/0x43e [ 504.162356][T16780] dump_stack+0x15/0x17 [ 504.166346][T16780] should_fail+0x3c0/0x510 [ 504.170603][T16780] __should_failslab+0x9f/0xe0 [ 504.175201][T16780] should_failslab+0x9/0x20 [ 504.179538][T16780] kmem_cache_alloc+0x4f/0x2f0 [ 504.184141][T16780] ? anon_vma_clone+0xa1/0x4f0 [ 504.188738][T16780] anon_vma_clone+0xa1/0x4f0 [ 504.193168][T16780] anon_vma_fork+0x91/0x4f0 [ 504.197504][T16780] ? anon_vma_name+0x43/0x70 [ 504.201940][T16780] dup_mmap+0x750/0xea0 [ 504.205928][T16780] ? __delayed_free_task+0x20/0x20 [ 504.210872][T16780] ? mm_init+0x807/0x960 [ 504.214963][T16780] dup_mm+0x91/0x330 [ 504.218685][T16780] copy_mm+0x108/0x1b0 [ 504.222587][T16780] copy_process+0x1295/0x3250 [ 504.227104][T16780] ? proc_fail_nth_write+0x213/0x290 [ 504.232224][T16780] ? proc_fail_nth_read+0x220/0x220 [ 504.237259][T16780] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 504.242205][T16780] ? vfs_write+0x9af/0x1050 [ 504.246543][T16780] ? vmacache_update+0xb7/0x120 [ 504.251231][T16780] kernel_clone+0x22d/0x990 [ 504.255572][T16780] ? file_end_write+0x1b0/0x1b0 [ 504.260256][T16780] ? __kasan_check_write+0x14/0x20 [ 504.265215][T16780] ? create_io_thread+0x1e0/0x1e0 [ 504.270064][T16780] ? __mutex_lock_slowpath+0x10/0x10 [ 504.275188][T16780] __x64_sys_clone+0x289/0x310 [ 504.279787][T16780] ? __do_sys_vfork+0x130/0x130 [ 504.284476][T16780] ? debug_smp_processor_id+0x17/0x20 [ 504.289682][T16780] do_syscall_64+0x44/0xd0 [ 504.293933][T16780] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 504.299661][T16780] RIP: 0033:0x7f8ab3ee50d9 [ 504.303915][T16780] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 03:48:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0x17, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) [ 504.323354][T16780] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 504.331600][T16780] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 504.339413][T16780] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 504.347228][T16780] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 504.355033][T16780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 504.362847][T16780] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 504.370667][T16780] 03:48:39 executing program 4: syz_clone(0xc0800400, 0x0, 0x800000000000000, 0x0, 0x0, 0x0) 03:48:39 executing program 0: perf_event_open(&(0x7f0000001940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0xb) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="9805000002000000000000004b64ffec850000007d000000850300080000000000019f01b6c01da6a000aeb2384c20ddbc741d0505a2543445c6634af5d5c0004bc7233ea0fd494ea25a8b17144a1f000000000000225a54c7493672daf26e47b577000000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) openat$cgroup_ro(r2, &(0x7f00000001c0)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000000180)=0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000640)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x10}, @ldst={0x2, 0x2, 0x2, 0x6, 0xb, 0x6, 0xfffffffffffffffc}, @map_fd={0x18, 0x7, 0x1, 0x0, r7}, @call={0x85, 0x0, 0x0, 0x33}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xc}, @map_fd={0x18, 0x7, 0x1, 0x0, r7}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x15, '\x00', r6, 0x11, r7, 0x8, &(0x7f0000000100)={0x5, 0x7}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x6, 0x0, 0xaf9}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000006c0)=[r7]}, 0x80) 03:48:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x100000000000000}, 0x38) 03:48:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='mm_page_alloc\x00', r0}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:39 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 78) 03:48:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0x17, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0x100, 0x9, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) close(r1) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) [ 504.486859][T16844] FAULT_INJECTION: forcing a failure. [ 504.486859][T16844] name failslab, interval 1, probability 0, space 0, times 0 [ 504.511288][T16844] CPU: 0 PID: 16844 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 504.521361][T16844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 504.531272][T16844] Call Trace: [ 504.534381][T16844] [ 504.537156][T16844] dump_stack_lvl+0x151/0x1b7 [ 504.541669][T16844] ? bfq_pos_tree_add_move+0x43e/0x43e [ 504.546971][T16844] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 504.553212][T16844] dump_stack+0x15/0x17 [ 504.557214][T16844] should_fail+0x3c0/0x510 [ 504.561459][T16844] __should_failslab+0x9f/0xe0 [ 504.566056][T16844] should_failslab+0x9/0x20 [ 504.570397][T16844] kmem_cache_alloc+0x4f/0x2f0 [ 504.575001][T16844] ? anon_vma_fork+0xf7/0x4f0 [ 504.579509][T16844] anon_vma_fork+0xf7/0x4f0 [ 504.583851][T16844] ? anon_vma_name+0x43/0x70 [ 504.588277][T16844] dup_mmap+0x750/0xea0 [ 504.592270][T16844] ? __delayed_free_task+0x20/0x20 [ 504.597216][T16844] ? mm_init+0x807/0x960 [ 504.601294][T16844] dup_mm+0x91/0x330 [ 504.605026][T16844] copy_mm+0x108/0x1b0 [ 504.608934][T16844] copy_process+0x1295/0x3250 [ 504.613446][T16844] ? proc_fail_nth_write+0x213/0x290 [ 504.618566][T16844] ? proc_fail_nth_read+0x220/0x220 [ 504.623600][T16844] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 504.628574][T16844] ? vfs_write+0x9af/0x1050 [ 504.632885][T16844] ? vmacache_update+0xb7/0x120 [ 504.637576][T16844] kernel_clone+0x22d/0x990 [ 504.641912][T16844] ? file_end_write+0x1b0/0x1b0 [ 504.646611][T16844] ? __kasan_check_write+0x14/0x20 [ 504.651552][T16844] ? create_io_thread+0x1e0/0x1e0 [ 504.656417][T16844] ? __mutex_lock_slowpath+0x10/0x10 [ 504.661531][T16844] __x64_sys_clone+0x289/0x310 [ 504.666131][T16844] ? __do_sys_vfork+0x130/0x130 [ 504.670820][T16844] ? debug_smp_processor_id+0x17/0x20 [ 504.676032][T16844] do_syscall_64+0x44/0xd0 [ 504.680287][T16844] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 504.686004][T16844] RIP: 0033:0x7f8ab3ee50d9 [ 504.690259][T16844] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 504.709703][T16844] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 504.717947][T16844] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 504.725850][T16844] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 03:48:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x200000000000000}, 0x38) 03:48:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0x100, 0x9, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) close(r1) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) [ 504.733654][T16844] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 504.741467][T16844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 504.749278][T16844] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 504.757092][T16844] 03:48:40 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/time\x00') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r2, 0x0, 0xf, &(0x7f0000000040)='%$&:.\\.#]+\\#.)\x00'}, 0x30) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 504.781956][T16844] ================================================================== [ 504.789855][T16844] BUG: KASAN: use-after-free in vm_area_free+0x7e/0x230 [ 504.796622][T16844] Write of size 4 at addr ffff888119d40ac0 by task syz-executor.3/16844 [ 504.804786][T16844] [ 504.806953][T16844] CPU: 0 PID: 16844 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 504.817023][T16844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 504.827118][T16844] Call Trace: [ 504.830211][T16844] [ 504.832990][T16844] dump_stack_lvl+0x151/0x1b7 [ 504.837505][T16844] ? bfq_pos_tree_add_move+0x43e/0x43e [ 504.842797][T16844] ? panic+0x727/0x727 [ 504.846702][T16844] ? slab_free_freelist_hook+0xc9/0x1a0 [ 504.852083][T16844] print_address_description+0x87/0x3d0 [ 504.857553][T16844] kasan_report+0x1a6/0x1f0 [ 504.861891][T16844] ? vm_area_free+0x7e/0x230 [ 504.866321][T16844] ? vm_area_free+0x7e/0x230 [ 504.870743][T16844] kasan_check_range+0x2aa/0x2e0 [ 504.875518][T16844] __kasan_check_write+0x14/0x20 [ 504.880290][T16844] vm_area_free+0x7e/0x230 [ 504.884548][T16844] dup_mmap+0xbcd/0xea0 [ 504.888544][T16844] ? __delayed_free_task+0x20/0x20 [ 504.893486][T16844] ? mm_init+0x807/0x960 [ 504.897563][T16844] dup_mm+0x91/0x330 [ 504.901295][T16844] copy_mm+0x108/0x1b0 [ 504.905287][T16844] copy_process+0x1295/0x3250 [ 504.909804][T16844] ? proc_fail_nth_write+0x213/0x290 [ 504.914924][T16844] ? proc_fail_nth_read+0x220/0x220 [ 504.920049][T16844] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 504.924992][T16844] ? vfs_write+0x9af/0x1050 [ 504.929332][T16844] ? vmacache_update+0xb7/0x120 [ 504.934020][T16844] kernel_clone+0x22d/0x990 [ 504.938356][T16844] ? file_end_write+0x1b0/0x1b0 [ 504.943044][T16844] ? __kasan_check_write+0x14/0x20 [ 504.947996][T16844] ? create_io_thread+0x1e0/0x1e0 [ 504.952877][T16844] ? __mutex_lock_slowpath+0x10/0x10 [ 504.957975][T16844] __x64_sys_clone+0x289/0x310 [ 504.962572][T16844] ? __do_sys_vfork+0x130/0x130 [ 504.967262][T16844] ? debug_smp_processor_id+0x17/0x20 [ 504.972469][T16844] do_syscall_64+0x44/0xd0 [ 504.976717][T16844] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 504.982446][T16844] RIP: 0033:0x7f8ab3ee50d9 [ 504.986700][T16844] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 505.006143][T16844] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 505.014389][T16844] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 505.022197][T16844] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 505.030012][T16844] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 505.037827][T16844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 505.045634][T16844] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 505.053542][T16844] [ 505.056398][T16844] [ 505.058563][T16844] Allocated by task 16780: [ 505.062818][T16844] __kasan_slab_alloc+0xb2/0xe0 [ 505.067503][T16844] kmem_cache_alloc+0x189/0x2f0 [ 505.072190][T16844] vm_area_dup+0x26/0x1d0 [ 505.076357][T16844] dup_mmap+0x6b8/0xea0 [ 505.080354][T16844] dup_mm+0x91/0x330 [ 505.084082][T16844] copy_mm+0x108/0x1b0 [ 505.087993][T16844] copy_process+0x1295/0x3250 [ 505.092502][T16844] kernel_clone+0x22d/0x990 [ 505.096841][T16844] __x64_sys_clone+0x289/0x310 [ 505.101456][T16844] do_syscall_64+0x44/0xd0 [ 505.105692][T16844] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 505.111422][T16844] [ 505.113592][T16844] Freed by task 16832: [ 505.117498][T16844] kasan_set_track+0x4c/0x70 [ 505.121925][T16844] kasan_set_free_info+0x23/0x40 [ 505.126698][T16844] ____kasan_slab_free+0x126/0x160 [ 505.131646][T16844] __kasan_slab_free+0x11/0x20 [ 505.136252][T16844] slab_free_freelist_hook+0xc9/0x1a0 [ 505.141452][T16844] kmem_cache_free+0x11a/0x2e0 [ 505.146057][T16844] vm_area_free+0x1ae/0x230 [ 505.150394][T16844] exit_mmap+0x5dd/0x7a0 [ 505.154470][T16844] __mmput+0x95/0x300 [ 505.158288][T16844] mmput+0x50/0x60 [ 505.161848][T16844] exit_mm+0x50d/0x760 [ 505.165843][T16844] do_exit+0x63c/0x24d0 [ 505.169839][T16844] __ia32_sys_exit+0x0/0x40 [ 505.174174][T16844] do_syscall_64+0x44/0xd0 [ 505.178514][T16844] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 505.184244][T16844] [ 505.186411][T16844] The buggy address belongs to the object at ffff888119d40a68 [ 505.186411][T16844] which belongs to the cache vm_area_struct of size 232 [ 505.200560][T16844] The buggy address is located 88 bytes inside of [ 505.200560][T16844] 232-byte region [ffff888119d40a68, ffff888119d40b50) [ 505.213579][T16844] The buggy address belongs to the page: [ 505.219048][T16844] page:ffffea0004675000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x119d40 [ 505.229118][T16844] flags: 0x4000000000000200(slab|zone=1) [ 505.234592][T16844] raw: 4000000000000200 0000000000000000 0000000c00000001 ffff888100275e00 [ 505.243008][T16844] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000 [ 505.251422][T16844] page dumped because: kasan: bad access detected [ 505.257670][T16844] page_owner tracks the page as allocated [ 505.263224][T16844] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 3027, ts 488917796806, free_ts 488879051753 [ 505.279284][T16844] post_alloc_hook+0x1ab/0x1b0 [ 505.283880][T16844] get_page_from_freelist+0x38b/0x400 [ 505.289091][T16844] __alloc_pages+0x3a8/0x7c0 [ 505.293513][T16844] allocate_slab+0x62/0x580 [ 505.297852][T16844] ___slab_alloc+0x2e2/0x6f0 [ 505.302280][T16844] __slab_alloc+0x4a/0x90 [ 505.306447][T16844] kmem_cache_alloc+0x205/0x2f0 [ 505.311134][T16844] vm_area_dup+0x26/0x1d0 [ 505.315304][T16844] dup_mmap+0x6b8/0xea0 [ 505.319291][T16844] dup_mm+0x91/0x330 [ 505.323024][T16844] copy_mm+0x108/0x1b0 [ 505.326929][T16844] copy_process+0x1295/0x3250 [ 505.331447][T16844] kernel_clone+0x22d/0x990 [ 505.335782][T16844] __x64_sys_clone+0x289/0x310 [ 505.340385][T16844] do_syscall_64+0x44/0xd0 [ 505.344634][T16844] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 505.350363][T16844] page last free stack trace: [ 505.354890][T16844] free_pcp_prepare+0x448/0x450 [ 505.359568][T16844] free_unref_page_list+0x16a/0xad0 [ 505.364604][T16844] release_pages+0xf3e/0xf90 [ 505.369024][T16844] free_pages_and_swap_cache+0x97/0xb0 [ 505.374319][T16844] tlb_flush_mmu+0x860/0xa00 [ 505.378747][T16844] tlb_finish_mmu+0xd2/0x1f0 [ 505.383171][T16844] exit_mmap+0x46e/0x7a0 [ 505.387250][T16844] __mmput+0x95/0x300 [ 505.391078][T16844] mmput+0x50/0x60 [ 505.394628][T16844] exit_mm+0x50d/0x760 [ 505.398533][T16844] do_exit+0x63c/0x24d0 [ 505.402528][T16844] do_group_exit+0x13a/0x300 [ 505.406955][T16844] get_signal+0x77e/0x1600 [ 505.411209][T16844] arch_do_signal_or_restart+0x9f/0x670 [ 505.416591][T16844] exit_to_user_mode_loop+0xd4/0x110 [ 505.421713][T16844] syscall_exit_to_user_mode+0x79/0xc0 [ 505.427003][T16844] [ 505.429184][T16844] Memory state around the buggy address: [ 505.434647][T16844] ffff888119d40980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 505.442553][T16844] ffff888119d40a00: fb fb fb fb fb fc fc fc fc fc fc fc fc fa fb fb [ 505.450528][T16844] >ffff888119d40a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 505.458423][T16844] ^ [ 505.464418][T16844] ffff888119d40b00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 505.472317][T16844] ffff888119d40b80: fc fc fa fb fb fb fb fb fb fb fb fb fb fb fb fb 03:48:40 executing program 0: perf_event_open(&(0x7f0000001940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0xb) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="9805000002000000000000004b64ffec850000007d000000850300080000000000019f01b6c01da6a000aeb2384c20ddbc741d0505a2543445c6634af5d5c0004bc7233ea0fd494ea25a8b17144a1f000000000000225a54c7493672daf26e47b577000000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async, rerun: 32) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) openat$cgroup_ro(r2, &(0x7f00000001c0)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000000180)=0x6) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000640)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x10}, @ldst={0x2, 0x2, 0x2, 0x6, 0xb, 0x6, 0xfffffffffffffffc}, @map_fd={0x18, 0x7, 0x1, 0x0, r7}, @call={0x85, 0x0, 0x0, 0x33}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xc}, @map_fd={0x18, 0x7, 0x1, 0x0, r7}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x15, '\x00', r6, 0x11, r7, 0x8, &(0x7f0000000100)={0x5, 0x7}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x6, 0x0, 0xaf9}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000006c0)=[r7]}, 0x80) 03:48:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x300000000000000}, 0x38) [ 505.480207][T16844] ================================================================== [ 505.488106][T16844] Disabling lock debugging due to kernel taint 03:48:41 executing program 4: syz_clone(0xc0800400, 0x0, 0x900000000000000, 0x0, 0x0, 0x0) 03:48:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0x100, 0x9, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) close(r1) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 03:48:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x800000000000000}, 0x38) 03:48:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) r1 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/time\x00') (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r2, 0x0, 0xf, &(0x7f0000000040)='%$&:.\\.#]+\\#.)\x00'}, 0x30) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:41 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 79) 03:48:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$cgroup(r2, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) 03:48:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xf00000000000000}, 0x38) [ 505.663861][T16881] FAULT_INJECTION: forcing a failure. [ 505.663861][T16881] name failslab, interval 1, probability 0, space 0, times 0 [ 505.677905][T16881] CPU: 1 PID: 16881 Comm: syz-executor.3 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 505.689358][T16881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 505.699253][T16881] Call Trace: [ 505.702378][T16881] [ 505.705161][T16881] dump_stack_lvl+0x151/0x1b7 [ 505.709677][T16881] ? bfq_pos_tree_add_move+0x43e/0x43e [ 505.715070][T16881] dump_stack+0x15/0x17 [ 505.719041][T16881] should_fail+0x3c0/0x510 [ 505.723291][T16881] __should_failslab+0x9f/0xe0 [ 505.727892][T16881] should_failslab+0x9/0x20 [ 505.732236][T16881] kmem_cache_alloc+0x4f/0x2f0 [ 505.736835][T16881] ? anon_vma_fork+0x1b9/0x4f0 [ 505.741433][T16881] anon_vma_fork+0x1b9/0x4f0 [ 505.746040][T16881] dup_mmap+0x750/0xea0 [ 505.750032][T16881] ? __delayed_free_task+0x20/0x20 [ 505.754971][T16881] ? mm_init+0x807/0x960 [ 505.759057][T16881] dup_mm+0x91/0x330 [ 505.762788][T16881] copy_mm+0x108/0x1b0 [ 505.766689][T16881] copy_process+0x1295/0x3250 [ 505.771202][T16881] ? proc_fail_nth_write+0x213/0x290 [ 505.776323][T16881] ? proc_fail_nth_read+0x220/0x220 [ 505.781357][T16881] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 505.786304][T16881] ? vfs_write+0x9af/0x1050 [ 505.790643][T16881] ? vmacache_update+0xb7/0x120 [ 505.795330][T16881] kernel_clone+0x22d/0x990 [ 505.799689][T16881] ? file_end_write+0x1b0/0x1b0 [ 505.804359][T16881] ? __kasan_check_write+0x14/0x20 [ 505.809309][T16881] ? create_io_thread+0x1e0/0x1e0 [ 505.814168][T16881] ? __mutex_lock_slowpath+0x10/0x10 [ 505.819374][T16881] __x64_sys_clone+0x289/0x310 [ 505.823980][T16881] ? __do_sys_vfork+0x130/0x130 [ 505.828660][T16881] ? debug_smp_processor_id+0x17/0x20 [ 505.833867][T16881] do_syscall_64+0x44/0xd0 [ 505.838226][T16881] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 505.843953][T16881] RIP: 0033:0x7f8ab3ee50d9 [ 505.848222][T16881] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 505.867654][T16881] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 505.875892][T16881] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 505.883711][T16881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 505.891516][T16881] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 505.899335][T16881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:48:41 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) [ 505.907145][T16881] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 505.915065][T16881] 03:48:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$cgroup(r2, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) 03:48:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x1000000000000000}, 0x38) 03:48:41 executing program 0: perf_event_open(&(0x7f0000001940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0xb) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="9805000002000000000000004b64ffec850000007d000000850300080000000000019f01b6c01da6a000aeb2384c20ddbc741d0505a2543445c6634af5d5c0004bc7233ea0fd494ea25a8b17144a1f000000000000225a54c7493672daf26e47b577000000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) openat$cgroup_ro(r2, &(0x7f00000001c0)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000000180)=0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000640)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x10}, @ldst={0x2, 0x2, 0x2, 0x6, 0xb, 0x6, 0xfffffffffffffffc}, @map_fd={0x18, 0x7, 0x1, 0x0, r7}, @call={0x85, 0x0, 0x0, 0x33}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xc}, @map_fd={0x18, 0x7, 0x1, 0x0, r7}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x15, '\x00', r6, 0x11, r7, 0x8, &(0x7f0000000100)={0x5, 0x7}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x6, 0x0, 0xaf9}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000006c0)=[r7]}, 0x80) 03:48:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0x2000000000000000}, 0x38) [ 506.002115][T16897] FAULT_INJECTION: forcing a failure. [ 506.002115][T16897] name failslab, interval 1, probability 0, space 0, times 0 [ 506.018120][T16897] CPU: 0 PID: 16897 Comm: syz-executor.3 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 506.029582][T16897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 506.039477][T16897] Call Trace: [ 506.042689][T16897] [ 506.045460][T16897] dump_stack_lvl+0x151/0x1b7 [ 506.049973][T16897] ? bfq_pos_tree_add_move+0x43e/0x43e [ 506.055271][T16897] dump_stack+0x15/0x17 [ 506.059262][T16897] should_fail+0x3c0/0x510 [ 506.063601][T16897] __should_failslab+0x9f/0xe0 [ 506.068201][T16897] should_failslab+0x9/0x20 [ 506.072539][T16897] kmem_cache_alloc+0x4f/0x2f0 [ 506.077141][T16897] ? vm_area_dup+0x26/0x1d0 [ 506.081480][T16897] ? __kasan_check_read+0x11/0x20 [ 506.086341][T16897] vm_area_dup+0x26/0x1d0 [ 506.090507][T16897] dup_mmap+0x6b8/0xea0 [ 506.094507][T16897] ? __delayed_free_task+0x20/0x20 [ 506.099446][T16897] ? mm_init+0x807/0x960 [ 506.103528][T16897] dup_mm+0x91/0x330 [ 506.107258][T16897] copy_mm+0x108/0x1b0 [ 506.111163][T16897] copy_process+0x1295/0x3250 [ 506.115683][T16897] ? proc_fail_nth_write+0x213/0x290 [ 506.120807][T16897] ? proc_fail_nth_read+0x220/0x220 [ 506.125835][T16897] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 506.130781][T16897] ? vfs_write+0x9af/0x1050 [ 506.135119][T16897] ? vmacache_update+0xb7/0x120 [ 506.139812][T16897] kernel_clone+0x22d/0x990 [ 506.144144][T16897] ? file_end_write+0x1b0/0x1b0 [ 506.148835][T16897] ? __kasan_check_write+0x14/0x20 [ 506.153783][T16897] ? create_io_thread+0x1e0/0x1e0 [ 506.158641][T16897] ? __mutex_lock_slowpath+0x10/0x10 [ 506.163762][T16897] __x64_sys_clone+0x289/0x310 [ 506.168363][T16897] ? __do_sys_vfork+0x130/0x130 [ 506.173048][T16897] ? debug_smp_processor_id+0x17/0x20 [ 506.178260][T16897] do_syscall_64+0x44/0xd0 [ 506.182509][T16897] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 506.188237][T16897] RIP: 0033:0x7f8ab3ee50d9 [ 506.192492][T16897] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 506.212192][T16897] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 506.220439][T16897] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 506.228274][T16897] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 506.236058][T16897] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 506.243874][T16897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 506.251684][T16897] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 506.259498][T16897] 03:48:41 executing program 4: syz_clone(0xc0800400, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 03:48:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/time\x00') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r2, 0x0, 0xf, &(0x7f0000000040)='%$&:.\\.#]+\\#.)\x00'}, 0x30) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) syz_clone(0x40802080, &(0x7f00000000c0)="9f0b173d39158602a2ebdd7d96494122c9f20b80b2eecf643b396ba40e814f43eb885a675e78ac2c8d8f3d63ddd86730e240c07d5ddc1939b602c40716500610887b98cf1580c0119a9a91e86bea989cb162b32324224f8308af1271edb3ccb679b55280474a725f7c121166e41a00fe99f3f8cf2416b829c3", 0x79, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)="599c959c23bf599dcedd599f58c1c29c73") (async) syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/time\x00') (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r2, 0x0, 0xf, &(0x7f0000000040)='%$&:.\\.#]+\\#.)\x00'}, 0x30) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 03:48:41 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) 03:48:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$cgroup(r2, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) 03:48:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@const={0xe, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x30, 0x0, 0x5f, 0x0, 0x5f, 0x0]}}, &(0x7f0000000200)=""/80, 0x2c, 0x50, 0x1}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000100)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000500)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000006c0)=0x1174000000) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7]}, 0x80) perf_event_open$cgroup(&(0x7f0000000640)={0x4, 0x80, 0x82, 0x4, 0xbb, 0x5, 0x0, 0x7, 0x221, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000440), 0x4}, 0x10000, 0xb2, 0x3, 0x9, 0x7, 0x5, 0x20, 0x0, 0x1, 0x0, 0x7}, r3, 0xffffffffffffffff, r6, 0x3) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0xf, &(0x7f00000017c0)=@raw=[@cb_func={0x18, 0x3, 0x4, 0x0, 0x3}, @map_idx_val={0x18, 0xf, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x5}, @exit, @call={0x85, 0x0, 0x0, 0x43}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x1, 0x5, 0xb, 0xb, 0x100, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7fffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x3, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x3f}], &(0x7f0000001740)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x4, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x1, 0x2, 0x1, 0x101}, 0x10}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001dc0)={r9, 0xe0, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000001a40)=[0x0], &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001ac0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001b80), &(0x7f0000001bc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001c00)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xf2ffffff00000000}, 0x38) 03:48:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xfeffffff00000000}, 0x38) 03:48:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r7, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r8, 0x0, r7, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4004662b, &(0x7f00000005c0)=0x1) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r10, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r10, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r7, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a00000700000000f708ecde219041000000000000001c3000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x2, 0x9, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, [@jmp={0x5, 0x0, 0x7, 0x9, 0x3, 0x6, 0x4}, @jmp={0x5, 0x0, 0xa, 0x0, 0x5, 0x8, 0xffffffffffffffff}, @exit, @alu={0x4, 0x0, 0xd, 0x9, 0x9, 0x50}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f00000006c0)='GPL\x00', 0x800, 0x6e, &(0x7f0000000800)=""/110, 0x40f00, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0xe, 0xfffffffe, 0x1}, 0x10}, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r6]}, 0x80) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r0}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000400000075010000feffffff85000000cd00000018000000dc64000000000000010000001857000010000000000000000000000018430000080000000077900800f0ffffffcb27f8ff040000007a08fcff0800000005749d00040000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x98, &(0x7f0000000100)=""/152, 0x41100, 0x18, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0xf, 0xfffffff7, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r0, r3, r11, r12]}, 0x80) [ 506.389940][T16925] FAULT_INJECTION: forcing a failure. [ 506.389940][T16925] name failslab, interval 1, probability 0, space 0, times 0 [ 506.415847][T16925] CPU: 1 PID: 16925 Comm: syz-executor.3 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 506.427315][T16925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 506.437205][T16925] Call Trace: [ 506.440413][T16925] [ 506.443187][T16925] dump_stack_lvl+0x151/0x1b7 [ 506.447703][T16925] ? bfq_pos_tree_add_move+0x43e/0x43e [ 506.452995][T16925] ? do_syscall_64+0x44/0xd0 [ 506.457425][T16925] dump_stack+0x15/0x17 [ 506.461421][T16925] should_fail+0x3c0/0x510 [ 506.465676][T16925] __should_failslab+0x9f/0xe0 [ 506.470268][T16925] should_failslab+0x9/0x20 [ 506.474606][T16925] kmem_cache_alloc+0x4f/0x2f0 [ 506.479210][T16925] ? anon_vma_clone+0xa1/0x4f0 [ 506.483814][T16925] anon_vma_clone+0xa1/0x4f0 [ 506.488245][T16925] anon_vma_fork+0x91/0x4f0 [ 506.492574][T16925] ? anon_vma_name+0x4c/0x70 [ 506.497002][T16925] dup_mmap+0x750/0xea0 [ 506.500994][T16925] ? __delayed_free_task+0x20/0x20 [ 506.505942][T16925] ? mm_init+0x807/0x960 [ 506.510030][T16925] dup_mm+0x91/0x330 [ 506.513757][T16925] copy_mm+0x108/0x1b0 [ 506.517663][T16925] copy_process+0x1295/0x3250 [ 506.522175][T16925] ? proc_fail_nth_write+0x213/0x290 [ 506.527292][T16925] ? proc_fail_nth_read+0x220/0x220 [ 506.532336][T16925] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 506.537274][T16925] ? vfs_write+0x9af/0x1050 [ 506.541620][T16925] ? vmacache_update+0xb7/0x120 [ 506.546301][T16925] kernel_clone+0x22d/0x990 [ 506.550645][T16925] ? file_end_write+0x1b0/0x1b0 [ 506.555325][T16925] ? __kasan_check_write+0x14/0x20 [ 506.560695][T16925] ? create_io_thread+0x1e0/0x1e0 [ 506.565480][T16925] ? __mutex_lock_slowpath+0x10/0x10 [ 506.570608][T16925] __x64_sys_clone+0x289/0x310 [ 506.575205][T16925] ? __do_sys_vfork+0x130/0x130 [ 506.579977][T16925] ? debug_smp_processor_id+0x17/0x20 [ 506.585188][T16925] do_syscall_64+0x44/0xd0 [ 506.589436][T16925] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 506.595163][T16925] RIP: 0033:0x7f8ab3ee50d9 [ 506.599418][T16925] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 506.618860][T16925] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 506.627212][T16925] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 03:48:42 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 82) 03:48:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xffffffffa0024000}, 0x38) [ 506.635136][T16925] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 506.642942][T16925] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 506.650757][T16925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 506.658566][T16925] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 506.666384][T16925] 03:48:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@const={0xe, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x30, 0x0, 0x5f, 0x0, 0x5f, 0x0]}}, &(0x7f0000000200)=""/80, 0x2c, 0x50, 0x1}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000100)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000500)='syz1\x00', 0x200002, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000006c0)=0x1174000000) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7]}, 0x80) (async) perf_event_open$cgroup(&(0x7f0000000640)={0x4, 0x80, 0x82, 0x4, 0xbb, 0x5, 0x0, 0x7, 0x221, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000440), 0x4}, 0x10000, 0xb2, 0x3, 0x9, 0x7, 0x5, 0x20, 0x0, 0x1, 0x0, 0x7}, r3, 0xffffffffffffffff, r6, 0x3) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0xf, &(0x7f00000017c0)=@raw=[@cb_func={0x18, 0x3, 0x4, 0x0, 0x3}, @map_idx_val={0x18, 0xf, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x5}, @exit, @call={0x85, 0x0, 0x0, 0x43}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x1, 0x5, 0xb, 0xb, 0x100, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7fffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x3, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x3f}], &(0x7f0000001740)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x4, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x1, 0x2, 0x1, 0x101}, 0x10}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001dc0)={r9, 0xe0, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000001a40)=[0x0], &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001ac0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001b80), &(0x7f0000001bc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001c00)}}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 32) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r7, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r8, 0x0, r7, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4004662b, &(0x7f00000005c0)=0x1) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r10, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r10, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r7, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a00000700000000f708ecde219041000000000000001c3000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x2, 0x9, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, [@jmp={0x5, 0x0, 0x7, 0x9, 0x3, 0x6, 0x4}, @jmp={0x5, 0x0, 0xa, 0x0, 0x5, 0x8, 0xffffffffffffffff}, @exit, @alu={0x4, 0x0, 0xd, 0x9, 0x9, 0x50}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f00000006c0)='GPL\x00', 0x800, 0x6e, &(0x7f0000000800)=""/110, 0x40f00, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0xe, 0xfffffffe, 0x1}, 0x10}, 0x80) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='cpuacct.usage_user\x00', 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r6]}, 0x80) (async, rerun: 64) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) (async, rerun: 64) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r0}, 0x8) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000400000075010000feffffff85000000cd00000018000000dc64000000000000010000001857000010000000000000000000000018430000080000000077900800f0ffffffcb27f8ff040000007a08fcff0800000005749d00040000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x98, &(0x7f0000000100)=""/152, 0x41100, 0x18, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0xf, 0xfffffff7, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r0, r3, r11, r12]}, 0x80) [ 506.759283][T16945] FAULT_INJECTION: forcing a failure. [ 506.759283][T16945] name failslab, interval 1, probability 0, space 0, times 0 [ 506.785422][T16945] CPU: 0 PID: 16945 Comm: syz-executor.3 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 506.796890][T16945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 506.806789][T16945] Call Trace: [ 506.809908][T16945] [ 506.812687][T16945] dump_stack_lvl+0x151/0x1b7 [ 506.817202][T16945] ? bfq_pos_tree_add_move+0x43e/0x43e [ 506.822494][T16945] dump_stack+0x15/0x17 [ 506.826485][T16945] should_fail+0x3c0/0x510 [ 506.830738][T16945] __should_failslab+0x9f/0xe0 [ 506.835336][T16945] should_failslab+0x9/0x20 [ 506.839678][T16945] kmem_cache_alloc+0x4f/0x2f0 [ 506.844276][T16945] ? anon_vma_clone+0xa1/0x4f0 [ 506.848877][T16945] anon_vma_clone+0xa1/0x4f0 [ 506.853305][T16945] anon_vma_fork+0x91/0x4f0 [ 506.857642][T16945] ? anon_vma_name+0x4c/0x70 [ 506.862069][T16945] dup_mmap+0x750/0xea0 [ 506.866063][T16945] ? __delayed_free_task+0x20/0x20 [ 506.871184][T16945] ? mm_init+0x807/0x960 [ 506.875267][T16945] dup_mm+0x91/0x330 [ 506.878992][T16945] copy_mm+0x108/0x1b0 [ 506.882906][T16945] copy_process+0x1295/0x3250 [ 506.887416][T16945] ? proc_fail_nth_write+0x213/0x290 [ 506.892534][T16945] ? proc_fail_nth_read+0x220/0x220 [ 506.897569][T16945] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 506.902515][T16945] ? vfs_write+0x9af/0x1050 [ 506.906855][T16945] ? vmacache_update+0xb7/0x120 [ 506.911543][T16945] kernel_clone+0x22d/0x990 [ 506.915883][T16945] ? file_end_write+0x1b0/0x1b0 [ 506.920565][T16945] ? __kasan_check_write+0x14/0x20 [ 506.925521][T16945] ? create_io_thread+0x1e0/0x1e0 [ 506.930375][T16945] ? __mutex_lock_slowpath+0x10/0x10 [ 506.935497][T16945] __x64_sys_clone+0x289/0x310 [ 506.940098][T16945] ? __do_sys_vfork+0x130/0x130 [ 506.944785][T16945] ? debug_smp_processor_id+0x17/0x20 [ 506.950004][T16945] do_syscall_64+0x44/0xd0 [ 506.954244][T16945] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 506.960058][T16945] RIP: 0033:0x7f8ab3ee50d9 [ 506.964311][T16945] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 506.983752][T16945] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 506.992008][T16945] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 506.999902][T16945] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 507.007710][T16945] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 507.015520][T16945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 507.023332][T16945] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 507.031590][T16945] 03:48:42 executing program 4: syz_clone(0xc0800400, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 03:48:42 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850400007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:42 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 83) 03:48:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0, 0x0, 0xffffffffff600000}, 0x38) 03:48:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@const={0xe, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x30, 0x0, 0x5f, 0x0, 0x5f, 0x0]}}, &(0x7f0000000200)=""/80, 0x2c, 0x50, 0x1}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000100)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 64) r2 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000500)='syz1\x00', 0x200002, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000006c0)=0x1174000000) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r5, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r7, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 32) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r7, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7]}, 0x80) (async) perf_event_open$cgroup(&(0x7f0000000640)={0x4, 0x80, 0x82, 0x4, 0xbb, 0x5, 0x0, 0x7, 0x221, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000440), 0x4}, 0x10000, 0xb2, 0x3, 0x9, 0x7, 0x5, 0x20, 0x0, 0x1, 0x0, 0x7}, r3, 0xffffffffffffffff, r6, 0x3) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0xf, &(0x7f00000017c0)=@raw=[@cb_func={0x18, 0x3, 0x4, 0x0, 0x3}, @map_idx_val={0x18, 0xf, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x5}, @exit, @call={0x85, 0x0, 0x0, 0x43}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x1, 0x5, 0xb, 0xb, 0x100, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7fffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x3, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x3f}], &(0x7f0000001740)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x4, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x1, 0x2, 0x1, 0x101}, 0x10}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001dc0)={r9, 0xe0, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000001a40)=[0x0], &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001ac0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001b80), &(0x7f0000001bc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001c00)}}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000000000000000000"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (rerun: 32) 03:48:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r7, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r8, 0x0, r7, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async, rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4004662b, &(0x7f00000005c0)=0x1) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r10, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r10, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r7, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a00000700000000f708ecde219041000000000000001c3000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x2, 0x9, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, [@jmp={0x5, 0x0, 0x7, 0x9, 0x3, 0x6, 0x4}, @jmp={0x5, 0x0, 0xa, 0x0, 0x5, 0x8, 0xffffffffffffffff}, @exit, @alu={0x4, 0x0, 0xd, 0x9, 0x9, 0x50}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f00000006c0)='GPL\x00', 0x800, 0x6e, &(0x7f0000000800)=""/110, 0x40f00, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0xe, 0xfffffffe, 0x1}, 0x10}, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='cpuacct.usage_user\x00', 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r4, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r3, 0xffffffffffffffff, r6]}, 0x80) (async, rerun: 32) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r0}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000400000075010000feffffff85000000cd00000018000000dc64000000000000010000001857000010000000000000000000000018430000080000000077900800f0ffffffcb27f8ff040000007a08fcff0800000005749d00040000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x98, &(0x7f0000000100)=""/152, 0x41100, 0x18, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0xf, 0xfffffff7, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r0, r3, r11, r12]}, 0x80) 03:48:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000180), 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x200006b8) [ 507.237566][T16973] FAULT_INJECTION: forcing a failure. [ 507.237566][T16973] name failslab, interval 1, probability 0, space 0, times 0 [ 507.263854][T16973] CPU: 1 PID: 16973 Comm: syz-executor.3 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 507.275317][T16973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 507.285214][T16973] Call Trace: [ 507.288334][T16973] [ 507.291110][T16973] dump_stack_lvl+0x151/0x1b7 [ 507.295629][T16973] ? bfq_pos_tree_add_move+0x43e/0x43e [ 507.300918][T16973] dump_stack+0x15/0x17 [ 507.304911][T16973] should_fail+0x3c0/0x510 [ 507.309164][T16973] __should_failslab+0x9f/0xe0 [ 507.313763][T16973] should_failslab+0x9/0x20 [ 507.318101][T16973] kmem_cache_alloc+0x4f/0x2f0 [ 507.322709][T16973] ? anon_vma_clone+0xa1/0x4f0 [ 507.327307][T16973] anon_vma_clone+0xa1/0x4f0 [ 507.331734][T16973] anon_vma_fork+0x91/0x4f0 [ 507.336067][T16973] ? anon_vma_name+0x4c/0x70 [ 507.340501][T16973] dup_mmap+0x750/0xea0 [ 507.344490][T16973] ? __delayed_free_task+0x20/0x20 [ 507.349435][T16973] ? mm_init+0x807/0x960 [ 507.353611][T16973] dup_mm+0x91/0x330 [ 507.357336][T16973] copy_mm+0x108/0x1b0 [ 507.361239][T16973] copy_process+0x1295/0x3250 [ 507.366275][T16973] ? proc_fail_nth_write+0x213/0x290 [ 507.371396][T16973] ? proc_fail_nth_read+0x220/0x220 [ 507.376428][T16973] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 507.381374][T16973] ? vfs_write+0x9af/0x1050 [ 507.385715][T16973] ? vmacache_update+0xb7/0x120 [ 507.390404][T16973] kernel_clone+0x22d/0x990 [ 507.394743][T16973] ? file_end_write+0x1b0/0x1b0 [ 507.399426][T16973] ? __kasan_check_write+0x14/0x20 [ 507.404465][T16973] ? create_io_thread+0x1e0/0x1e0 [ 507.409324][T16973] ? __mutex_lock_slowpath+0x10/0x10 [ 507.414449][T16973] __x64_sys_clone+0x289/0x310 [ 507.419048][T16973] ? __do_sys_vfork+0x130/0x130 [ 507.423747][T16973] ? debug_smp_processor_id+0x17/0x20 [ 507.428969][T16973] do_syscall_64+0x44/0xd0 [ 507.433198][T16973] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 507.438922][T16973] RIP: 0033:0x7f8ab3ee50d9 [ 507.443173][T16973] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 507.462706][T16973] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 507.470956][T16973] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 [ 507.478763][T16973] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 03:48:42 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850400007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:42 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 84) 03:48:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18050000000000005d002c25c147f021ec2900004b64ffec850000010700000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001940)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 507.486573][T16973] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 507.494379][T16973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 507.502198][T16973] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 507.510010][T16973] 03:48:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f00000000c0)="8178337da72d51b67bc17dd9de9920e72ffbf4fc310723a0766afde6b4eb8f66d8e40dd09abbea5103b630594f621f0a235ab22229e3a700caa670102e13e04559130af7adb6460f7f0b5e3c2cbb36e0e27e6273a8c5cccd8e92d9a05e6518a950d76529092fc13a81037a9d69c07c8a6b4a9f10874132403b6c4df0e89bcc91b597fd2a5c36c0a073dcb3c41dca1400"/159, 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x3, 0x0, 0xff, 0x3f, 0x0, 0x0, 0x14001, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x5624, 0x1df}, 0x112c2, 0x401, 0x6b, 0xa, 0x6, 0x1, 0x9, 0x0, 0x5}, r0, 0xa, r0, 0x1) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xf, 0xa, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0xf, 0x5, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, @exit, @map_fd={0x18, 0x7}], &(0x7f0000000140)='syzkaller\x00', 0x80000, 0x9d, &(0x7f00000002c0)=""/157, 0xf99392c4c606acd7, 0x12, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x1, 0x1, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0xffffffffffffffff, r0, r2, r1, r10, r0]}, 0x80) [ 507.624879][T16999] FAULT_INJECTION: forcing a failure. [ 507.624879][T16999] name failslab, interval 1, probability 0, space 0, times 0 [ 507.652166][T16999] CPU: 1 PID: 16999 Comm: syz-executor.3 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 507.663634][T16999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 03:48:43 executing program 4: syz_clone(0xc0800400, 0x0, 0x542700a0ffffffff, 0x0, 0x0, 0x0) 03:48:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f00000000c0)="8178337da72d51b67bc17dd9de9920e72ffbf4fc310723a0766afde6b4eb8f66d8e40dd09abbea5103b630594f621f0a235ab22229e3a700caa670102e13e04559130af7adb6460f7f0b5e3c2cbb36e0e27e6273a8c5cccd8e92d9a05e6518a950d76529092fc13a81037a9d69c07c8a6b4a9f10874132403b6c4df0e89bcc91b597fd2a5c36c0a073dcb3c41dca1400"/159, 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:43 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000002ffff0000000000001000850400007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:48:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18050000000000005d002c25c147f021ec2900004b64ffec850000010700000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001940)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) [ 507.673525][T16999] Call Trace: [ 507.676662][T16999] [ 507.679428][T16999] dump_stack_lvl+0x151/0x1b7 [ 507.683946][T16999] ? bfq_pos_tree_add_move+0x43e/0x43e [ 507.689241][T16999] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 507.695589][T16999] dump_stack+0x15/0x17 [ 507.699580][T16999] should_fail+0x3c0/0x510 [ 507.703831][T16999] __should_failslab+0x9f/0xe0 [ 507.708430][T16999] should_failslab+0x9/0x20 [ 507.712775][T16999] kmem_cache_alloc+0x4f/0x2f0 [ 507.717373][T16999] ? anon_vma_fork+0xf7/0x4f0 [ 507.721884][T16999] anon_vma_fork+0xf7/0x4f0 [ 507.726236][T16999] ? anon_vma_name+0x4c/0x70 [ 507.730653][T16999] dup_mmap+0x750/0xea0 [ 507.734645][T16999] ? __delayed_free_task+0x20/0x20 [ 507.739596][T16999] ? mm_init+0x807/0x960 [ 507.743669][T16999] dup_mm+0x91/0x330 [ 507.747410][T16999] copy_mm+0x108/0x1b0 [ 507.751394][T16999] copy_process+0x1295/0x3250 [ 507.755907][T16999] ? proc_fail_nth_write+0x213/0x290 [ 507.761116][T16999] ? proc_fail_nth_read+0x220/0x220 [ 507.766150][T16999] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 507.771095][T16999] ? vfs_write+0x9af/0x1050 [ 507.775436][T16999] ? vmacache_update+0xb7/0x120 [ 507.780131][T16999] kernel_clone+0x22d/0x990 [ 507.784468][T16999] ? file_end_write+0x1b0/0x1b0 [ 507.789149][T16999] ? __kasan_check_write+0x14/0x20 [ 507.794096][T16999] ? create_io_thread+0x1e0/0x1e0 [ 507.798958][T16999] ? __mutex_lock_slowpath+0x10/0x10 [ 507.804080][T16999] __x64_sys_clone+0x289/0x310 [ 507.808766][T16999] ? __do_sys_vfork+0x130/0x130 [ 507.813453][T16999] ? debug_smp_processor_id+0x17/0x20 [ 507.818663][T16999] do_syscall_64+0x44/0xd0 [ 507.822912][T16999] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 507.828641][T16999] RIP: 0033:0x7f8ab3ee50d9 [ 507.832894][T16999] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 507.852336][T16999] RSP: 002b:00007f8ab2c58118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 507.860580][T16999] RAX: ffffffffffffffda RBX: 00007f8ab4004f80 RCX: 00007f8ab3ee50d9 03:48:43 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 85) 03:48:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f00000000c0)="8178337da72d51b67bc17dd9de9920e72ffbf4fc310723a0766afde6b4eb8f66d8e40dd09abbea5103b630594f621f0a235ab22229e3a700caa670102e13e04559130af7adb6460f7f0b5e3c2cbb36e0e27e6273a8c5cccd8e92d9a05e6518a950d76529092fc13a81037a9d69c07c8a6b4a9f10874132403b6c4df0e89bcc91b597fd2a5c36c0a073dcb3c41dca1400"/159, 0x0, &(0x7f00000000c0), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) (rerun: 64) 03:48:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x3, 0x0, 0xff, 0x3f, 0x0, 0x0, 0x14001, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x5624, 0x1df}, 0x112c2, 0x401, 0x6b, 0xa, 0x6, 0x1, 0x9, 0x0, 0x5}, r0, 0xa, r0, 0x1) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xf, 0xa, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0xf, 0x5, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, @exit, @map_fd={0x18, 0x7}], &(0x7f0000000140)='syzkaller\x00', 0x80000, 0x9d, &(0x7f00000002c0)=""/157, 0xf99392c4c606acd7, 0x12, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x1, 0x1, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0xffffffffffffffff, r0, r2, r1, r10, r0]}, 0x80) [ 507.868392][T16999] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 507.876205][T16999] RBP: 00007f8ab2c581d0 R08: 0000000000000000 R09: 0000000000000000 [ 507.884014][T16999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 507.891829][T16999] R13: 00007fffa41c353f R14: 00007f8ab2c58300 R15: 0000000000022000 [ 507.899649][T16999] 03:48:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x8, 0x4, 0x1ff, 0x402, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x1}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001900)={0xffffffffffffffff, 0xe0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001740), &(0x7f0000001680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000017c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0xd, 0xa, &(0x7f0000001a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x50000, 0x1000, &(0x7f0000000580)=""/4096, 0x41000, 0xc, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000015c0), 0x8, 0x10, &(0x7f0000001600)={0x5, 0x0, 0xf28f, 0x4}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000001940)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r10, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r11, 0x0, r10, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x4004662b, &(0x7f00000005c0)=0x1) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r13, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r13, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r13, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r10, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r12, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, r9, 0xffffffffffffffff, r13]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0xa, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0xf}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}, @generic={0x6, 0x1, 0x4, 0x2, 0x132a}, @exit, @call={0x85, 0x0, 0x0, 0xa1}, @exit, @btf_id={0x18, 0x1, 0x3, 0x0, 0x2}], &(0x7f0000000140)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x13, r5, 0x8, &(0x7f0000000180)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x4, 0x2, 0x5}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[r0, r8, r0, r9]}, 0x80) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000440)={&(0x7f0000000180), 0x0, &(0x7f0000000480), &(0x7f0000000640)="1091cc", 0x9e0, r0}, 0x38) 03:48:43 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100009669286310fa551f00007b0000009500"/37], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)=0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r2, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r5]}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r7, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xfffffffffffffef0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r8, 0x0, r7, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4004662b, &(0x7f00000005c0)=0x1) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r10, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r10, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18430000000000000000000000000200417eb3f135b5a01831cb270000", @ANYRES32=r7, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6, 0xffffffffffffffff, r6, 0xffffffffffffffff, r10]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x6, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4dc}, [@map_fd={0x18, 0x7}, @generic={0xc0, 0x0, 0x5, 0x132f, 0x3ff}, @alu={0x7, 0x1, 0xa, 0x8, 0xb, 0x6, 0x4}, @call={0x85, 0x0, 0x0, 0x47}, @ldst={0x3, 0x1, 0xf1e4b4dccb9d4995, 0x2, 0x8, 0xffffffffffffffc0, 0xfffffffffffffff0}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000280)='GPL\x00', 0x5, 0x44, &(0x7f00000002c0)=""/68, 0x40f00, 0xd, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0xc, 0x7, 0xfffffffc}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0x1, r7]}, 0x80) 03:48:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18050000000000005d002c25c147f021ec2900004b64ffec850000010700000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xd010000000000000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x3, &(0x7f0000001940)=ANY=[@ANYBLOB="185a00000e0000009082ff4f000000000000000870000008000000e020fdba0084668968868865f5cb8d34c8f37cc74e635a75568739e5be0b000020000000000000953be5c1b15b5e7b13e4a3e29517ac069e2b31feaecdd04aa84afa5c45b77193ca4932ecbde3e36bfebb584ea7f048443eba050e2683c84a379afceb92269f14ea90967cf5792b0d304575eb1d161ca89dad2db0d6de400d13d9a3d9e9f09de1acb44e254d5cae120c62e2d9563e361421195c523398d5c8c8ca1a7149cb00e7c7400fabc9c71ea06e6391b6808edf395d0fc9623d2027b44989454e655205c1c99f2bf32b3510e80bc79045920d8aa9783a7a7763186253c0c3f75322fceb2c9a37a8622727ed23e2"], &(0x7f0000000700)='syzkaller\x00', 0xf7bd, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001780)={0x0, 0x7, 0x0, 0x1d572dec}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 03:48:43 executing program 4: syz_clone(0xc0800400, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 03:48:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) (rerun: 32) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x3, 0x0, 0xff, 0x3f, 0x0, 0x0, 0x14001, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x5624, 0x1df}, 0x112c2, 0x401, 0x6b, 0xa, 0x6, 0x1, 0x9, 0x0, 0x5}, r0, 0xa, r0, 0x1) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async, rerun: 32) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f00000002c0), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r6, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r3, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r6]}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x40f00, 0x6, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x9, 0x4}, 0x10}, 0x80) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f00000005c0)=0x1) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=@base={0xb, 0x5, 0xfffd, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r11, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r11, &(0x7f00000002c0)="7e49e42a58", &(0x7f0000000380)=""/152}, 0x20) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="1843000000000000000000000000000018270000", @ANYRES32=r8, @ANYBLOB="0000000000040000ca740000f0ffffff9500000000000000185a0000070000000000000000000000183000000200000000000000000000008520000001000000a04ead64472273a76c019a8b1c0c22731ad1d5a6912ee04acf8cf3df6e66818bd2bd28b7f65e9714cb6fe56c42d257d4c2995e7f5a9282eccebfc7ff12e7aa62b8c6"], &(0x7f0000000540)='GPL\x00', 0x0, 0x8, &(0x7f0000000580)=""/8, 0x40f00, 0x10, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x3f}, 0x10, 0xffffffffffffffff, r10, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff, r11]}, 0x80) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xf, 0xa, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0xf, 0x5, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, @exit, @map_fd={0x18, 0x7}], &(0x7f0000000140)='syzkaller\x00', 0x80000, 0x9d, &(0x7f00000002c0)=""/157, 0xf99392c4c606acd7, 0x12, '\x00', 0x0, 0x19, 0xffffffff