@btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @alu={0x7, 0x1, 0x5, 0x4, 0x1, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000300)={&(0x7f0000000100)=""/214, 0xd6, 0x0, &(0x7f0000000200)=""/224, 0xe0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x2, &(0x7f0000000740)=@raw=[@jmp={0x5, 0x0, 0x0, 0x3, 0x3, 0xffffffffffffffe0, 0x10}, @alu={0x7, 0x1, 0x6, 0x0, 0x5, 0xfffffffffffffff4, 0x10}], &(0x7f0000000780)='syzkaller\x00', 0x37f, 0x3f, &(0x7f00000007c0)=""/63, 0x41100, 0x1, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000800)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0xb, 0x9}, 0x10, 0x1d321, r4}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000900)={&(0x7f0000000700)='./file0\x00', r5}, 0x10) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, r1, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:31 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0xfffffe8d, &(0x7f0000000080)}, 0x5b) 23:30:31 executing program 4: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 23:30:31 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:31 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0xfffffe8d, &(0x7f0000000080)}, 0x5b) 23:30:31 executing program 0: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:31 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x1ff, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x10000}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffffffb}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @alu={0x7, 0x1, 0x5, 0x4, 0x1, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000300)={&(0x7f0000000100)=""/214, 0xd6, 0x0, &(0x7f0000000200)=""/224, 0xe0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x2, &(0x7f0000000740)=@raw=[@jmp={0x5, 0x0, 0x0, 0x3, 0x3, 0xffffffffffffffe0, 0x10}, @alu={0x7, 0x1, 0x6, 0x0, 0x5, 0xfffffffffffffff4, 0x10}], &(0x7f0000000780)='syzkaller\x00', 0x37f, 0x3f, &(0x7f00000007c0)=""/63, 0x41100, 0x1, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000800)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0xb, 0x9}, 0x10, 0x1d321, r4}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000900)={&(0x7f0000000700)='./file0\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, r1, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:31 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0x0, 0x4}, 0x14) 23:30:31 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa", 0xbd, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:31 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0xfffffe8d, &(0x7f0000000080)}, 0x5b) 23:30:31 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0x0, 0x4}, 0x14) 23:30:32 executing program 0: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:32 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={0x0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0xfffffe8d, &(0x7f0000000080)}, 0x5b) 23:30:32 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={0x0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0xfffffe8d, &(0x7f0000000080)}, 0x5b) 23:30:32 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0x0, 0x4}, 0x14) 23:30:32 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988", 0x6c, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:32 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={0x0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0xfffffe8d, &(0x7f0000000080)}, 0x5b) 23:30:32 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x1ff, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x10000}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffffffb}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @alu={0x7, 0x1, 0x5, 0x4, 0x1, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000300)={&(0x7f0000000100)=""/214, 0xd6, 0x0, &(0x7f0000000200)=""/224, 0xe0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x2, &(0x7f0000000740)=@raw=[@jmp={0x5, 0x0, 0x0, 0x3, 0x3, 0xffffffffffffffe0, 0x10}, @alu={0x7, 0x1, 0x6, 0x0, 0x5, 0xfffffffffffffff4, 0x10}], &(0x7f0000000780)='syzkaller\x00', 0x37f, 0x3f, &(0x7f00000007c0)=""/63, 0x41100, 0x1, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000800)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0xb, 0x9}, 0x10, 0x1d321, r4}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, r1, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xb9, 0xc0, 0x1f, 0x2, 0x0, 0x8000, 0x200, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:32 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0x1b}, 0x14) 23:30:32 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc91", 0xca, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0xc0, 0x1f, 0x2, 0x0, 0x8000, 0x200, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:32 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x1ff, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x10000}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffffffb}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @alu={0x7, 0x1, 0x5, 0x4, 0x1, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000300)={&(0x7f0000000100)=""/214, 0xd6, 0x0, &(0x7f0000000200)=""/224, 0xe0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, r1, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:32 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 23:30:32 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x1ff, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x10000}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffffffb}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @alu={0x7, 0x1, 0x5, 0x4, 0x1, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000300)={&(0x7f0000000100)=""/214, 0xd6, 0x0, &(0x7f0000000200)=""/224, 0xe0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x2, &(0x7f0000000740)=@raw=[@jmp={0x5, 0x0, 0x0, 0x3, 0x3, 0xffffffffffffffe0, 0x10}, @alu={0x7, 0x1, 0x6, 0x0, 0x5, 0xfffffffffffffff4, 0x10}], &(0x7f0000000780)='syzkaller\x00', 0x37f, 0x3f, &(0x7f00000007c0)=""/63, 0x41100, 0x1, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000800)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0xb, 0x9}, 0x10, 0x1d321, r4}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, r1, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:32 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 23:30:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x2, 0x0, 0x8000, 0x200, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:32 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988", 0x6c, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x200, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:32 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x1ff, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x10000}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffffffb}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @alu={0x7, 0x1, 0x5, 0x4, 0x1, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000300)={&(0x7f0000000100)=""/214, 0xd6, 0x0, &(0x7f0000000200)=""/224, 0xe0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, r1, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x200, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:32 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 23:30:32 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc91", 0xca, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:32 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0xfffffe8d, &(0x7f0000000080)}, 0x5b) 23:30:32 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x1ff, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x10000}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffffffb}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @alu={0x7, 0x1, 0x5, 0x4, 0x1, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, r1, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:32 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:32 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988", 0x6c, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:32 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 23:30:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:32 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 23:30:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:32 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 23:30:33 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc91", 0xca, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:33 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x1ff, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, r1, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:33 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988", 0x6c, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:33 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:33 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb06", 0xa2, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:33 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, r1, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:33 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, r1, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:33 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa", 0xbd, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:33 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:33 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8", 0xd1, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:33 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:33 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x1ff, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x10000}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffffffb}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @alu={0x7, 0x1, 0x5, 0x4, 0x1, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000300)={&(0x7f0000000100)=""/214, 0xd6, 0x0, &(0x7f0000000200)=""/224, 0xe0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x2, &(0x7f0000000740)=@raw=[@jmp={0x5, 0x0, 0x0, 0x3, 0x3, 0xffffffffffffffe0, 0x10}, @alu={0x7, 0x1, 0x6, 0x0, 0x5, 0xfffffffffffffff4, 0x10}], &(0x7f0000000780)='syzkaller\x00', 0x37f, 0x3f, &(0x7f00000007c0)=""/63, 0x41100, 0x1, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000800)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0xb, 0x9}, 0x10, 0x1d321, r4}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000900)={&(0x7f0000000700)='./file0\x00', r5}, 0x10) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x77, 0x7, 0x4, 0x800, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2, 0xa}, 0x48) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r7}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, r1, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, r4, r6, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:33 executing program 4: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f}, [@call={0x85, 0x0, 0x0, 0x6a}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x7}]}, &(0x7f0000000040)='syzkaller\x00', 0x7fff, 0xb0, &(0x7f0000000080)=""/176, 0x40f00, 0x1c, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x4, 0x7, 0x1000}, 0x10}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, r0, 0x1b, 0x4}, 0x14) 23:30:33 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb06", 0xa2, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:33 executing program 2: r0 = syz_clone(0x40000000, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:33 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb06", 0xa2, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:33 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:30:34 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8", 0xd1, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:34 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:30:34 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:30:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:34 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca", 0x6d, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:34 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8", 0xd1, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:34 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb06", 0xa2, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:34 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8", 0xd1, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:34 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb06", 0xa2, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:34 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca", 0x6d, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:35 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca", 0x6d, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:35 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7", 0xd4, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:35 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb06", 0xa2, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:35 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8", 0xd1, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:35 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1", 0x38, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x5, &(0x7f0000000000)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:35 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7", 0xd4, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:36 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca", 0x6d, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:36 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1", 0x38, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:36 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1", 0x38, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:36 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7", 0xd4, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:36 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1", 0x38, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:36 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7", 0xd4, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:36 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a", 0xd6, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:36 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1", 0x38, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 23:30:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:30:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:37 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8", 0xd1, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:37 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb06", 0xa2, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:37 executing program 3: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca", 0x6d, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:37 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a", 0xd6, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:37 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e", 0x53, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 23:30:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 23:30:38 executing program 2: r0 = syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r1}, 0x4) syz_clone(0x1010080, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3f, 0x3, 0x3, 0x0, 0x0, 0x1, 0x410, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x8000, 0x1, 0x401, 0x2, 0x5, 0x5, 0x0, 0x0, 0x100, 0x0, 0x6}, r0, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x2, 0x0, 0x67, 0x1, 0x0, 0xff, 0x2, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x1, 0x9}, 0x400, 0x4, 0x7fff, 0x5, 0x1, 0xcc5, 0x1000, 0x0, 0x128, 0x0, 0x8001}) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0xb9, 0xc0, 0x1f, 0x2, 0x0, 0x8000, 0x200, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, r0, 0x1, 0xffffffffffffffff, 0x8) 23:30:38 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x400000, 0x200, 0xfffffffb, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, r0, 0x4, 0x4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xdd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6a43}, @generic={0x88, 0x8, 0x4, 0x1ff, 0x5}, @generic={0x1, 0x1, 0xf, 0x5, 0x10000}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, &(0x7f00000002c0), 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x0, 0x7249, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0x1]}, 0x80) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0x8}}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x25, 0x0, 0x4d, 0x2}]}, {0x0, [0x0, 0x5f, 0x61, 0x30, 0x0, 0x30]}}, &(0x7f0000000600)=""/58, 0x48, 0x3a}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r2, &(0x7f00000004c0)="ffec34ad280c265cce06a36c8245412d1d7c4291f2f216e0ef5c091e93c2ebdae1ec68f12854c125ab0ddc83584fbdadbde0346c0b20df9e1f49d628f47eba2ab28f9cfa2e938b11e1eeb3a5d0aba9cc5a69ea5df31562297857b1d8588bb16f39cf88b2f0d1479c87f946d99273c2c9f1ff22581438e8c8eb7220ba58d0e1a06c43cdce899957a1f68f0fbb0eb94d91f177978859c8784b456f906213637481b95d"}, 0x20) 23:30:38 executing program 3: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca", 0x6d, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:38 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a", 0xd6, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:38 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e", 0x53, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:38 executing program 2: r0 = syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r1}, 0x4) syz_clone(0x1010080, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3f, 0x3, 0x3, 0x0, 0x0, 0x1, 0x410, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x8000, 0x1, 0x401, 0x2, 0x5, 0x5, 0x0, 0x0, 0x100, 0x0, 0x6}, r0, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x2, 0x0, 0x67, 0x1, 0x0, 0xff, 0x2, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x1, 0x9}, 0x400, 0x4, 0x7fff, 0x5, 0x1, 0xcc5, 0x1000, 0x0, 0x128, 0x0, 0x8001}) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0xb9, 0xc0, 0x1f, 0x2, 0x0, 0x8000, 0x200, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, r0, 0x1, 0xffffffffffffffff, 0x8) 23:30:38 executing program 0: perf_event_open(&(0x7f0000000280)={0x700, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:38 executing program 0: perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:38 executing program 0: perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:38 executing program 0: perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:38 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:38 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:38 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x400000, 0x200, 0xfffffffb, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, r0, 0x4, 0x4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xdd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6a43}, @generic={0x88, 0x8, 0x4, 0x1ff, 0x5}, @generic={0x1, 0x1, 0xf, 0x5, 0x10000}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, &(0x7f00000002c0), 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x0, 0x7249, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0x1]}, 0x80) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0x8}}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x25, 0x0, 0x4d, 0x2}]}, {0x0, [0x0, 0x5f, 0x61, 0x30, 0x0, 0x30]}}, &(0x7f0000000600)=""/58, 0x48, 0x3a}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r2, &(0x7f00000004c0)="ffec34ad280c265cce06a36c8245412d1d7c4291f2f216e0ef5c091e93c2ebdae1ec68f12854c125ab0ddc83584fbdadbde0346c0b20df9e1f49d628f47eba2ab28f9cfa2e938b11e1eeb3a5d0aba9cc5a69ea5df31562297857b1d8588bb16f39cf88b2f0d1479c87f946d99273c2c9f1ff22581438e8c8eb7220ba58d0e1a06c43cdce899957a1f68f0fbb0eb94d91f177978859c8784b456f906213637481b95d"}, 0x20) 23:30:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 1) 23:30:38 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 705.560854][T31410] FAULT_INJECTION: forcing a failure. [ 705.560854][T31410] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 705.687027][T31410] CPU: 0 PID: 31410 Comm: syz-executor.3 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 705.697105][T31410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 705.707169][T31410] Call Trace: [ 705.710292][T31410] [ 705.713068][T31410] dump_stack_lvl+0x151/0x1b7 [ 705.717584][T31410] ? bfq_pos_tree_add_move+0x43e/0x43e [ 705.722877][T31410] ? avc_has_perm+0x16d/0x260 [ 705.727393][T31410] ? __kasan_check_write+0x14/0x20 [ 705.732340][T31410] dump_stack+0x15/0x17 23:30:39 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:39 executing program 2: r0 = syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r1}, 0x4) syz_clone(0x1010080, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3f, 0x3, 0x3, 0x0, 0x0, 0x1, 0x410, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x8000, 0x1, 0x401, 0x2, 0x5, 0x5, 0x0, 0x0, 0x100, 0x0, 0x6}, r0, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x2, 0x0, 0x67, 0x1, 0x0, 0xff, 0x2, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x1, 0x9}, 0x400, 0x4, 0x7fff, 0x5, 0x1, 0xcc5, 0x1000, 0x0, 0x128, 0x0, 0x8001}) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0xb9, 0xc0, 0x1f, 0x2, 0x0, 0x8000, 0x200, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7fff, 0xffffffff80000001}, 0x5154, 0x7f, 0x4, 0x2, 0x1, 0x394, 0x1, 0x0, 0x9, 0x0, 0x8000}, r0, 0x1, 0xffffffffffffffff, 0x8) 23:30:39 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:39 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e", 0x53, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) [ 705.736504][T31410] should_fail+0x3c0/0x510 [ 705.740760][T31410] should_fail_usercopy+0x1a/0x20 [ 705.745619][T31410] _copy_from_user+0x20/0xd0 [ 705.750044][T31410] perf_copy_attr+0x16f/0x860 [ 705.754557][T31410] __se_sys_perf_event_open+0x103/0x3cb0 [ 705.760031][T31410] ? file_end_write+0x1b0/0x1b0 [ 705.764802][T31410] ? __kasan_check_write+0x14/0x20 [ 705.769746][T31410] ? mutex_lock+0xb6/0x130 [ 705.774000][T31410] ? __kasan_check_write+0x14/0x20 [ 705.778945][T31410] ? mutex_unlock+0xa2/0x110 [ 705.783374][T31410] ? __mutex_lock_slowpath+0x10/0x10 [ 705.788506][T31410] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 705.793963][T31410] ? __ia32_sys_read+0x90/0x90 [ 705.798562][T31410] __x64_sys_perf_event_open+0xbf/0xd0 [ 705.803855][T31410] do_syscall_64+0x44/0xd0 [ 705.808109][T31410] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 705.813835][T31410] RIP: 0033:0x7f06d59c40a9 [ 705.818096][T31410] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 705.837706][T31410] RSP: 002b:00007f06d4737168 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 705.845951][T31410] RAX: ffffffffffffffda RBX: 00007f06d5ae3f80 RCX: 00007f06d59c40a9 [ 705.854193][T31410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 705.862012][T31410] RBP: 00007f06d47371d0 R08: 0000000000000000 R09: 0000000000000000 [ 705.869960][T31410] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 705.877770][T31410] R13: 00007ffe14f0514f R14: 00007f06d4737300 R15: 0000000000022000 23:30:39 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x400000, 0x200, 0xfffffffb, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, r0, 0x4, 0x4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xdd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6a43}, @generic={0x88, 0x8, 0x4, 0x1ff, 0x5}, @generic={0x1, 0x1, 0xf, 0x5, 0x10000}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, &(0x7f00000002c0), 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x0, 0x7249, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0x1]}, 0x80) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0x8}}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x25, 0x0, 0x4d, 0x2}]}, {0x0, [0x0, 0x5f, 0x61, 0x30, 0x0, 0x30]}}, &(0x7f0000000600)=""/58, 0x48, 0x3a}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r2, &(0x7f00000004c0)="ffec34ad280c265cce06a36c8245412d1d7c4291f2f216e0ef5c091e93c2ebdae1ec68f12854c125ab0ddc83584fbdadbde0346c0b20df9e1f49d628f47eba2ab28f9cfa2e938b11e1eeb3a5d0aba9cc5a69ea5df31562297857b1d8588bb16f39cf88b2f0d1479c87f946d99273c2c9f1ff22581438e8c8eb7220ba58d0e1a06c43cdce899957a1f68f0fbb0eb94d91f177978859c8784b456f906213637481b95d"}, 0x20) 23:30:39 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:39 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 705.885669][T31410] 23:30:39 executing program 0: perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:39 executing program 2: r0 = syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r1}, 0x4) syz_clone(0x1010080, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3f, 0x3, 0x3, 0x0, 0x0, 0x1, 0x410, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x8000, 0x1, 0x401, 0x2, 0x5, 0x5, 0x0, 0x0, 0x100, 0x0, 0x6}, r0, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x2, 0x0, 0x67, 0x1, 0x0, 0xff, 0x2, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x1, 0x9}, 0x400, 0x4, 0x7fff, 0x5, 0x1, 0xcc5, 0x1000, 0x0, 0x128, 0x0, 0x8001}) 23:30:39 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x400000, 0x200, 0xfffffffb, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, r0, 0x4, 0x4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xdd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6a43}, @generic={0x88, 0x8, 0x4, 0x1ff, 0x5}, @generic={0x1, 0x1, 0xf, 0x5, 0x10000}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, &(0x7f00000002c0), 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x0, 0x7249, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0x1]}, 0x80) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0x8}}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x25, 0x0, 0x4d, 0x2}]}, {0x0, [0x0, 0x5f, 0x61, 0x30, 0x0, 0x30]}}, &(0x7f0000000600)=""/58, 0x48, 0x3a}, 0x20) 23:30:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:39 executing program 0: perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:39 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x400000, 0x200, 0xfffffffb, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, r0, 0x4, 0x4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xdd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6a43}, @generic={0x88, 0x8, 0x4, 0x1ff, 0x5}, @generic={0x1, 0x1, 0xf, 0x5, 0x10000}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, &(0x7f00000002c0), 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x0, 0x7249, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0x1]}, 0x80) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) 23:30:39 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:39 executing program 2: r0 = syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r1}, 0x4) syz_clone(0x1010080, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3f, 0x3, 0x3, 0x0, 0x0, 0x1, 0x410, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x8000, 0x1, 0x401, 0x2, 0x5, 0x5, 0x0, 0x0, 0x100, 0x0, 0x6}, r0, 0x5, 0xffffffffffffffff, 0x1) 23:30:39 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c", 0x60, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:39 executing program 0: perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:39 executing program 0: perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:39 executing program 2: r0 = syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r1}, 0x4) syz_clone(0x1010080, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) 23:30:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:40 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x400000, 0x200, 0xfffffffb, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, r0, 0x4, 0x4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xdd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6a43}, @generic={0x88, 0x8, 0x4, 0x1ff, 0x5}, @generic={0x1, 0x1, 0xf, 0x5, 0x10000}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, &(0x7f00000002c0), 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x0, 0x7249, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0x1]}, 0x80) bpf$ITER_CREATE(0x21, 0x0, 0x0) 23:30:40 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:40 executing program 2: r0 = syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r1}, 0x4) syz_clone(0x1010080, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) 23:30:40 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:40 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:40 executing program 2: r0 = syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r1}, 0x4) syz_clone(0x1010080, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") 23:30:40 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x400000, 0x200, 0xfffffffb, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, r0, 0x4, 0x4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xdd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6a43}, @generic={0x88, 0x8, 0x4, 0x1ff, 0x5}, @generic={0x1, 0x1, 0xf, 0x5, 0x10000}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, &(0x7f00000002c0), 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x0, 0x7249, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0x1]}, 0x80) 23:30:40 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c", 0x60, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:40 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:40 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:40 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:40 executing program 2: r0 = syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x1010080, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") 23:30:41 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x400000, 0x200, 0xfffffffb, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, r0, 0x4, 0x4, 0x1, 0x1}, 0x48) 23:30:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:41 executing program 0: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:41 executing program 2: syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x1010080, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") 23:30:41 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:41 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c", 0x60, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:41 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) 23:30:41 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x400000, 0x200, 0xfffffffb, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, r0, 0x4, 0x4, 0x1, 0x1}, 0x48) 23:30:41 executing program 2: syz_clone(0x1010080, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") 23:30:41 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x400000, 0x200, 0xfffffffb, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, r0, 0x4, 0x4, 0x1, 0x1}, 0x48) 23:30:41 executing program 2: syz_clone(0x0, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") 23:30:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x10, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:41 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x400000, 0x200, 0xfffffffb, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, r0, 0x4, 0x4, 0x1, 0x1}, 0x48) 23:30:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x300, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:41 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:41 executing program 2: syz_clone(0x0, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") 23:30:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) 23:30:41 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) 23:30:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x500, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:41 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e", 0x53, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x600, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x700, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000000140), 0x10) 23:30:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x4000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:41 executing program 2: syz_clone(0x0, &(0x7f0000000540)="cbb7eca5fcf3e8148f34f672504b2128d9370ecd087418d2", 0x18, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") 23:30:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x400001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:42 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00000000000000000104000003000000000000000a0000000300000604000000070000000800000003000000040000000e0000000400000000305f00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:42 executing program 2: syz_clone(0x1010080, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") 23:30:42 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e", 0x53, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1004000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x2000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x3000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:42 executing program 1: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x4000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:42 executing program 2: syz_clone(0x1010080, 0x0, 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") 23:30:43 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e", 0x53, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x5000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:43 executing program 2: syz_clone(0x1010080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)="5bc6867de7f593e27ca219e341a08f65fe6794bd23de7ef3c2e8687bf1dbb61e2c1c2c6a30ab5dca65e698cd1fbff5d491c557117110d6ce25722568b3ad2fbb3b24ee51599a53c842d557face468ccbfc0d2e010e69013c9c3f594952cb8e02c965e82652fc3fb8842021ada015ffe1aed7d55d69aff511b6872d73009be1f588f4aea59a8f965629300433a27d982ce2c31c43e29a64ab7c024176a3e79bd97783e6c4e4") 23:30:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x6000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:43 executing program 1: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x7000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:43 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7", 0x5a, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x8000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:43 executing program 2: syz_clone(0x1010080, 0x0, 0x0, 0x0, 0x0, 0x0) 23:30:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x10000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:44 executing program 1: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x40000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e", 0x53, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7", 0x5a, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x20000080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d0000000000000000010400000300"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:44 executing program 1: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e", 0x53, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:44 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7", 0x5a, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 1: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:45 executing program 1: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:45 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d0000000000000000010400000300"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7", 0x5a, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 23:30:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:45 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7", 0x5a, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:45 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:46 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 23:30:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7", 0x5a, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:46 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 23:30:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3", 0x5c, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:47 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3", 0x5c, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 23:30:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3", 0x5c, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:47 executing program 0: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3", 0x5c, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:47 executing program 0: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 23:30:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:48 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:48 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:49 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:49 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:50 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:50 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:50 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:50 executing program 2: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 23:30:51 executing program 0: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 2: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 23:30:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 0: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:51 executing program 2: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 23:30:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 0: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:51 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000000000000002"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000000000000002"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000000000000002"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 2: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:52 executing program 0: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) 23:30:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 23:30:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 0: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) 23:30:52 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:52 executing program 0: syz_clone(0x0, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) 23:30:53 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:53 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:53 executing program 0: syz_clone(0x0, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) 23:30:53 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:53 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:53 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:54 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:54 executing program 0: syz_clone(0x0, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6", 0x5d, 0x0, &(0x7f0000000140), 0x0) 23:30:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d0000000000000000010400000300"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:54 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 23:30:54 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7", 0x5a, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:54 executing program 0: syz_clone(0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) 23:30:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d0000000000000000010400000300"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:55 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:55 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7", 0x5a, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d0000000000000000010400000300"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:55 executing program 0: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:30:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000001000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:56 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:56 executing program 0: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:30:56 executing program 1: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7", 0x5a, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000010000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000100000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:30:56 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:56 executing program 0: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:30:56 executing program 1: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:30:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:30:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:57 executing program 5: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c6dfe8e5a28cf1a28595d2988ca18e8d233e1e09b405c071452a1bc2bb2179935703b8ba3598aadc25ff8396bc2e6c6847cb2882d82a20196bb1cc406f9ba7b61cb0653c481033d7a87d19e5a548a57c23dda2594c3b70c40da82a7dcfa40263170a33ca369258d61fc911845f7391ab2a8fd81c7005a83", 0xd7, 0x0, &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:57 executing program 0: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e7282e90e6712e7e1c3f6f4894c", 0x60, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:57 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000000)="2afa10786a2ed0e48dba85788a55a48136ccbb111ec0ac11a2e7ba9fc1e96fc7138be2e247996688bf36548c7c6bee8d88d4cd9211d4f7f1752c579bb71f57a6e884ee5bc977af5e9f28afe857fbf67288b92e", 0x53, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+],(@.++-\x00'}, 0x30) 23:30:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (fail_nth: 1) 23:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (fail_nth: 1) 23:30:57 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 23:30:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:57 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:57 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 724.396997][T32573] FAULT_INJECTION: forcing a failure. [ 724.396997][T32573] name failslab, interval 1, probability 0, space 0, times 0 [ 724.410455][T32565] FAULT_INJECTION: forcing a failure. [ 724.410455][T32565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 724.458437][T32573] CPU: 1 PID: 32573 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 724.468644][T32573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 724.478628][T32573] Call Trace: [ 724.481750][T32573] [ 724.484531][T32573] dump_stack_lvl+0x151/0x1b7 [ 724.489041][T32573] ? bfq_pos_tree_add_move+0x43e/0x43e [ 724.494339][T32573] ? do_handle_mm_fault+0x142f/0x2370 [ 724.496076][T32581] FAULT_INJECTION: forcing a failure. [ 724.496076][T32581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 724.499543][T32573] dump_stack+0x15/0x17 [ 724.499566][T32573] should_fail+0x3c0/0x510 [ 724.499585][T32573] __should_failslab+0x9f/0xe0 [ 724.525238][T32573] should_failslab+0x9/0x20 [ 724.529573][T32573] kmem_cache_alloc+0x4f/0x2f0 [ 724.534175][T32573] ? dup_task_struct+0x53/0xa60 [ 724.538860][T32573] ? __kasan_check_write+0x14/0x20 [ 724.543808][T32573] dup_task_struct+0x53/0xa60 [ 724.548320][T32573] ? __kasan_check_write+0x14/0x20 [ 724.553703][T32573] copy_process+0x579/0x3250 [ 724.558126][T32573] ? __kasan_check_write+0x14/0x20 [ 724.563075][T32573] ? proc_fail_nth_write+0x213/0x290 [ 724.568196][T32573] ? proc_fail_nth_read+0x220/0x220 [ 724.573233][T32573] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 724.578178][T32573] ? vfs_write+0x9af/0x1050 [ 724.582518][T32573] ? vmacache_update+0xb7/0x120 [ 724.587206][T32573] kernel_clone+0x22d/0x990 [ 724.591548][T32573] ? file_end_write+0x1b0/0x1b0 [ 724.596233][T32573] ? __kasan_check_write+0x14/0x20 [ 724.601178][T32573] ? create_io_thread+0x1e0/0x1e0 [ 724.606041][T32573] ? __mutex_lock_slowpath+0x10/0x10 [ 724.611160][T32573] __x64_sys_clone+0x289/0x310 [ 724.615763][T32573] ? __do_sys_vfork+0x130/0x130 [ 724.620449][T32573] ? debug_smp_processor_id+0x17/0x20 [ 724.625657][T32573] do_syscall_64+0x44/0xd0 [ 724.629907][T32573] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 724.635635][T32573] RIP: 0033:0x7f14733430a9 [ 724.639890][T32573] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 724.650146][ T30] audit: type=1400 audit(1672702257.940:106): avc: denied { unlink } for pid=164 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 724.659326][T32573] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 724.659349][T32573] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 724.659362][T32573] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 724.705244][T32573] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 724.713054][T32573] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 724.720869][T32573] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 724.728766][T32573] [ 724.731632][T32581] CPU: 0 PID: 32581 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 724.741695][T32581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 724.751622][T32581] Call Trace: [ 724.754720][T32581] [ 724.757494][T32581] dump_stack_lvl+0x151/0x1b7 [ 724.762006][T32581] ? bfq_pos_tree_add_move+0x43e/0x43e [ 724.767323][T32581] dump_stack+0x15/0x17 [ 724.771298][T32581] should_fail+0x3c0/0x510 [ 724.775547][T32581] should_fail_usercopy+0x1a/0x20 [ 724.780409][T32581] _copy_from_user+0x20/0xd0 [ 724.784832][T32581] __sys_bpf+0x1f6/0x750 [ 724.788921][T32581] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 724.794126][T32581] ? debug_smp_processor_id+0x17/0x20 [ 724.799335][T32581] __x64_sys_bpf+0x7c/0x90 [ 724.803580][T32581] do_syscall_64+0x44/0xd0 [ 724.807862][T32581] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 724.813563][T32581] RIP: 0033:0x7f7afbb090a9 [ 724.817813][T32581] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 724.837256][T32581] RSP: 002b:00007f7afa87c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 724.845501][T32581] RAX: ffffffffffffffda RBX: 00007f7afbc28f80 RCX: 00007f7afbb090a9 [ 724.853315][T32581] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 724.861124][T32581] RBP: 00007f7afa87c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 724.868934][T32581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 724.876744][T32581] R13: 00007fff87418f3f R14: 00007f7afa87c300 R15: 0000000000022000 [ 724.884568][T32581] [ 724.887422][T32565] CPU: 1 PID: 32565 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 724.897492][T32565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 724.907382][T32565] Call Trace: [ 724.910506][T32565] [ 724.913284][T32565] dump_stack_lvl+0x151/0x1b7 [ 724.917797][T32565] ? bfq_pos_tree_add_move+0x43e/0x43e [ 724.923093][T32565] dump_stack+0x15/0x17 [ 724.927085][T32565] should_fail+0x3c0/0x510 [ 724.931337][T32565] should_fail_usercopy+0x1a/0x20 [ 724.936196][T32565] _copy_from_user+0x20/0xd0 [ 724.940632][T32565] __sys_bpf+0x1f6/0x750 [ 724.944705][T32565] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 724.949914][T32565] ? debug_smp_processor_id+0x17/0x20 [ 724.955128][T32565] __x64_sys_bpf+0x7c/0x90 [ 724.959374][T32565] do_syscall_64+0x44/0xd0 [ 724.963623][T32565] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 724.969357][T32565] RIP: 0033:0x7f4d1c5780a9 [ 724.973610][T32565] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 724.993048][T32565] RSP: 002b:00007f4d1b2eb168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 725.001291][T32565] RAX: ffffffffffffffda RBX: 00007f4d1c697f80 RCX: 00007f4d1c5780a9 [ 725.009108][T32565] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 725.016914][T32565] RBP: 00007f4d1b2eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.024731][T32565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 725.032546][T32565] R13: 00007ffca1fa875f R14: 00007f4d1b2eb300 R15: 0000000000022000 [ 725.040355][T32565] 23:30:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (fail_nth: 2) 23:30:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:58 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) 23:30:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:58 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:58 executing program 0: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:58 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 725.322659][T32588] FAULT_INJECTION: forcing a failure. [ 725.322659][T32588] name failslab, interval 1, probability 0, space 0, times 0 [ 725.377295][T32588] CPU: 1 PID: 32588 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 725.387366][T32588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 725.397257][T32588] Call Trace: [ 725.400386][T32588] [ 725.403162][T32588] dump_stack_lvl+0x151/0x1b7 [ 725.407675][T32588] ? bfq_pos_tree_add_move+0x43e/0x43e [ 725.412971][T32588] ? __this_cpu_preempt_check+0x13/0x20 [ 725.418349][T32588] dump_stack+0x15/0x17 [ 725.421323][T32606] FAULT_INJECTION: forcing a failure. [ 725.421323][T32606] name failslab, interval 1, probability 0, space 0, times 0 [ 725.422340][T32588] should_fail+0x3c0/0x510 [ 725.422363][T32588] __should_failslab+0x9f/0xe0 [ 725.443610][T32588] should_failslab+0x9/0x20 [ 725.447950][T32588] kmem_cache_alloc+0x4f/0x2f0 [ 725.452547][T32588] ? __kasan_check_write+0x14/0x20 [ 725.457492][T32588] ? prepare_creds+0x30/0x690 [ 725.462014][T32588] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 725.467307][T32588] prepare_creds+0x30/0x690 [ 725.471643][T32588] copy_creds+0xde/0x640 [ 725.475725][T32588] copy_process+0x775/0x3250 [ 725.480162][T32588] ? __kasan_check_write+0x14/0x20 [ 725.485096][T32588] ? proc_fail_nth_write+0x213/0x290 [ 725.490216][T32588] ? proc_fail_nth_read+0x220/0x220 [ 725.495254][T32588] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 725.500199][T32588] ? vfs_write+0x9af/0x1050 [ 725.504537][T32588] ? vmacache_update+0xb7/0x120 [ 725.509224][T32588] kernel_clone+0x22d/0x990 [ 725.513561][T32588] ? file_end_write+0x1b0/0x1b0 [ 725.518253][T32588] ? __kasan_check_write+0x14/0x20 [ 725.523200][T32588] ? create_io_thread+0x1e0/0x1e0 [ 725.528055][T32588] ? __mutex_lock_slowpath+0x10/0x10 [ 725.533177][T32588] __x64_sys_clone+0x289/0x310 [ 725.537777][T32588] ? __do_sys_vfork+0x130/0x130 [ 725.542464][T32588] ? debug_smp_processor_id+0x17/0x20 [ 725.547672][T32588] do_syscall_64+0x44/0xd0 [ 725.551955][T32588] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 725.557653][T32588] RIP: 0033:0x7f14733430a9 [ 725.561911][T32588] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 725.581349][T32588] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 725.589595][T32588] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 725.597408][T32588] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 725.605227][T32588] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.613028][T32588] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 725.620838][T32588] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 725.628739][T32588] [ 725.632940][T32606] CPU: 0 PID: 32606 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 725.643003][T32606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 725.652896][T32606] Call Trace: [ 725.656020][T32606] [ 725.658795][T32606] dump_stack_lvl+0x151/0x1b7 [ 725.663313][T32606] ? bfq_pos_tree_add_move+0x43e/0x43e [ 725.668607][T32606] ? cred_has_capability+0x2ca/0x420 [ 725.673729][T32606] dump_stack+0x15/0x17 [ 725.677720][T32606] should_fail+0x3c0/0x510 [ 725.681971][T32606] ? btf_new_fd+0x11b/0x900 [ 725.686322][T32606] __should_failslab+0x9f/0xe0 [ 725.690909][T32606] should_failslab+0x9/0x20 [ 725.695248][T32606] kmem_cache_alloc_trace+0x4a/0x310 [ 725.700374][T32606] btf_new_fd+0x11b/0x900 [ 725.704540][T32606] bpf_btf_load+0x6f/0x90 [ 725.708703][T32606] __sys_bpf+0x514/0x750 [ 725.713132][T32606] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 725.718341][T32606] ? debug_smp_processor_id+0x17/0x20 [ 725.723544][T32606] __x64_sys_bpf+0x7c/0x90 [ 725.727884][T32606] do_syscall_64+0x44/0xd0 [ 725.732136][T32606] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 725.737864][T32606] RIP: 0033:0x7f7afbb090a9 [ 725.742118][T32606] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 725.761562][T32606] RSP: 002b:00007f7afa87c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 725.769808][T32606] RAX: ffffffffffffffda RBX: 00007f7afbc28f80 RCX: 00007f7afbb090a9 [ 725.777617][T32606] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 725.785429][T32606] RBP: 00007f7afa87c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.793939][T32606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 725.801748][T32606] R13: 00007fff87418f3f R14: 00007f7afa87c300 R15: 0000000000022000 [ 725.809765][T32606] 23:30:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:59 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000040000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:59 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:59 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) 23:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:59 executing program 1: perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:30:59 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:30:59 executing program 1: perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 726.445170][T32615] FAULT_INJECTION: forcing a failure. [ 726.445170][T32615] name failslab, interval 1, probability 0, space 0, times 0 [ 726.498987][T32615] CPU: 1 PID: 32615 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 726.509062][T32615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 726.518954][T32615] Call Trace: [ 726.522074][T32615] [ 726.524853][T32615] dump_stack_lvl+0x151/0x1b7 [ 726.529366][T32615] ? bfq_pos_tree_add_move+0x43e/0x43e [ 726.534747][T32615] dump_stack+0x15/0x17 [ 726.538738][T32615] should_fail+0x3c0/0x510 [ 726.542993][T32615] ? security_prepare_creds+0x50/0x160 [ 726.548290][T32615] __should_failslab+0x9f/0xe0 [ 726.552888][T32615] should_failslab+0x9/0x20 [ 726.557226][T32615] __kmalloc+0x6d/0x350 [ 726.561219][T32615] security_prepare_creds+0x50/0x160 [ 726.566340][T32615] prepare_creds+0x471/0x690 [ 726.570766][T32615] copy_creds+0xde/0x640 [ 726.574846][T32615] copy_process+0x775/0x3250 [ 726.579271][T32615] ? __kasan_check_write+0x14/0x20 [ 726.584222][T32615] ? proc_fail_nth_write+0x213/0x290 [ 726.589338][T32615] ? proc_fail_nth_read+0x220/0x220 [ 726.594375][T32615] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 726.599322][T32615] ? vfs_write+0x9af/0x1050 [ 726.603660][T32615] ? vmacache_update+0xb7/0x120 [ 726.608347][T32615] kernel_clone+0x22d/0x990 [ 726.612686][T32615] ? irqentry_exit+0x30/0x40 [ 726.617113][T32615] ? common_interrupt+0x65/0xd0 [ 726.621799][T32615] ? create_io_thread+0x1e0/0x1e0 [ 726.626663][T32615] __x64_sys_clone+0x289/0x310 [ 726.631262][T32615] ? __do_sys_vfork+0x130/0x130 [ 726.635948][T32615] ? debug_smp_processor_id+0x17/0x20 [ 726.641159][T32615] do_syscall_64+0x44/0xd0 [ 726.645412][T32615] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 726.651144][T32615] RIP: 0033:0x7f14733430a9 [ 726.655478][T32615] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 726.674917][T32615] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 726.683165][T32615] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 726.690979][T32615] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 0: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 726.698786][T32615] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.706600][T32615] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 726.714408][T32615] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 726.722221][T32615] 23:31:00 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4) 23:31:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 0: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 726.860605][T32655] FAULT_INJECTION: forcing a failure. [ 726.860605][T32655] name failslab, interval 1, probability 0, space 0, times 0 [ 726.912269][T32655] CPU: 1 PID: 32655 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 726.922352][T32655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 726.932245][T32655] Call Trace: [ 726.935365][T32655] [ 726.938143][T32655] dump_stack_lvl+0x151/0x1b7 [ 726.942662][T32655] ? bfq_pos_tree_add_move+0x43e/0x43e [ 726.947954][T32655] ? avc_has_perm_noaudit+0x358/0x450 [ 726.953160][T32655] dump_stack+0x15/0x17 [ 726.957152][T32655] should_fail+0x3c0/0x510 [ 726.961401][T32655] __should_failslab+0x9f/0xe0 [ 726.966002][T32655] should_failslab+0x9/0x20 [ 726.970342][T32655] kmem_cache_alloc+0x4f/0x2f0 [ 726.974944][T32655] ? dup_fd+0x71/0xa40 [ 726.978850][T32655] dup_fd+0x71/0xa40 [ 726.982667][T32655] ? avc_has_perm+0x16d/0x260 [ 726.987186][T32655] ? avc_has_perm_noaudit+0x450/0x450 [ 726.992402][T32655] copy_files+0xe6/0x200 [ 726.996467][T32655] ? perf_event_attrs+0x30/0x30 [ 727.001161][T32655] ? dup_task_struct+0xa60/0xa60 [ 727.005928][T32655] ? security_task_alloc+0x132/0x150 [ 727.011051][T32655] copy_process+0x11e9/0x3250 [ 727.015570][T32655] ? proc_fail_nth_write+0x213/0x290 [ 727.020684][T32655] ? proc_fail_nth_read+0x220/0x220 [ 727.025718][T32655] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 727.030663][T32655] ? vfs_write+0x9af/0x1050 [ 727.035003][T32655] ? vmacache_update+0xb7/0x120 [ 727.039691][T32655] kernel_clone+0x22d/0x990 [ 727.044030][T32655] ? file_end_write+0x1b0/0x1b0 [ 727.048715][T32655] ? __kasan_check_write+0x14/0x20 [ 727.053666][T32655] ? create_io_thread+0x1e0/0x1e0 [ 727.058524][T32655] ? __mutex_lock_slowpath+0x10/0x10 [ 727.063648][T32655] __x64_sys_clone+0x289/0x310 [ 727.068246][T32655] ? __do_sys_vfork+0x130/0x130 [ 727.072932][T32655] ? debug_smp_processor_id+0x17/0x20 [ 727.078139][T32655] do_syscall_64+0x44/0xd0 [ 727.082393][T32655] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 727.088124][T32655] RIP: 0033:0x7f14733430a9 [ 727.092372][T32655] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:31:00 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5) [ 727.111814][T32655] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 727.120063][T32655] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 727.127873][T32655] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 727.135679][T32655] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 727.143500][T32655] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 727.151390][T32655] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 727.159204][T32655] 23:31:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 727.223623][T32676] FAULT_INJECTION: forcing a failure. [ 727.223623][T32676] name failslab, interval 1, probability 0, space 0, times 0 [ 727.249937][T32676] CPU: 0 PID: 32676 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 727.260013][T32676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 727.269908][T32676] Call Trace: [ 727.273031][T32676] [ 727.275809][T32676] dump_stack_lvl+0x151/0x1b7 [ 727.280322][T32676] ? bfq_pos_tree_add_move+0x43e/0x43e [ 727.285623][T32676] dump_stack+0x15/0x17 [ 727.289614][T32676] should_fail+0x3c0/0x510 [ 727.293866][T32676] ? alloc_fdtable+0xaf/0x2b0 [ 727.298373][T32676] __should_failslab+0x9f/0xe0 [ 727.302974][T32676] should_failslab+0x9/0x20 [ 727.307313][T32676] kmem_cache_alloc_trace+0x4a/0x310 [ 727.312522][T32676] ? __kasan_check_write+0x14/0x20 [ 727.317467][T32676] ? _raw_spin_lock+0xa3/0x1b0 [ 727.322071][T32676] alloc_fdtable+0xaf/0x2b0 [ 727.326409][T32676] dup_fd+0x781/0xa40 [ 727.330223][T32676] ? avc_has_perm+0x16d/0x260 [ 727.334741][T32676] copy_files+0xe6/0x200 [ 727.338819][T32676] ? perf_event_attrs+0x30/0x30 [ 727.343513][T32676] ? dup_task_struct+0xa60/0xa60 [ 727.348278][T32676] ? security_task_alloc+0x132/0x150 [ 727.353400][T32676] copy_process+0x11e9/0x3250 [ 727.357914][T32676] ? proc_fail_nth_write+0x213/0x290 [ 727.363032][T32676] ? proc_fail_nth_read+0x220/0x220 [ 727.368068][T32676] ? pidfd_show_fdinfo+0x2b0/0x2b0 23:31:00 executing program 0: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 0: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 727.373016][T32676] ? vfs_write+0x9af/0x1050 [ 727.377353][T32676] ? vmacache_update+0xb7/0x120 [ 727.382042][T32676] kernel_clone+0x22d/0x990 [ 727.386383][T32676] ? file_end_write+0x1b0/0x1b0 [ 727.391072][T32676] ? __kasan_check_write+0x14/0x20 [ 727.396016][T32676] ? create_io_thread+0x1e0/0x1e0 [ 727.400874][T32676] ? __mutex_lock_slowpath+0x10/0x10 [ 727.405999][T32676] __x64_sys_clone+0x289/0x310 [ 727.411318][T32676] ? __do_sys_vfork+0x130/0x130 [ 727.416007][T32676] ? debug_smp_processor_id+0x17/0x20 [ 727.421215][T32676] do_syscall_64+0x44/0xd0 [ 727.425467][T32676] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 727.431193][T32676] RIP: 0033:0x7f14733430a9 [ 727.435448][T32676] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 727.454890][T32676] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 727.463136][T32676] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:00 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 6) 23:31:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 0: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d00"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:01 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:01 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:01 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 727.470944][T32676] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 727.478753][T32676] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 727.486563][T32676] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 727.494375][T32676] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 727.502448][T32676] 23:31:01 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:01 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:01 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 727.541727][T32704] FAULT_INJECTION: forcing a failure. [ 727.541727][T32704] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 727.563080][T32704] CPU: 1 PID: 32704 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 727.573146][T32704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 727.583131][T32704] Call Trace: [ 727.586255][T32704] [ 727.589029][T32704] dump_stack_lvl+0x151/0x1b7 [ 727.593543][T32704] ? bfq_pos_tree_add_move+0x43e/0x43e [ 727.598852][T32704] dump_stack+0x15/0x17 [ 727.602831][T32704] should_fail+0x3c0/0x510 [ 727.607088][T32704] should_fail_alloc_page+0x58/0x70 [ 727.612160][T32704] __alloc_pages+0x1de/0x7c0 [ 727.616561][T32704] ? __count_vm_events+0x30/0x30 [ 727.621318][T32704] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 727.626522][T32704] __get_free_pages+0xe/0x30 [ 727.630945][T32704] kasan_populate_vmalloc_pte+0x39/0x130 [ 727.636412][T32704] ? __apply_to_page_range+0x8a5/0xb90 [ 727.641708][T32704] __apply_to_page_range+0x8b8/0xb90 [ 727.646829][T32704] ? kasan_populate_vmalloc+0x70/0x70 [ 727.652038][T32704] ? kasan_populate_vmalloc+0x70/0x70 [ 727.657243][T32704] apply_to_page_range+0x3b/0x50 [ 727.662107][T32704] kasan_populate_vmalloc+0x65/0x70 [ 727.667144][T32704] alloc_vmap_area+0x1946/0x1a90 [ 727.671924][T32704] ? vm_map_ram+0xa80/0xa80 [ 727.676252][T32704] ? __kasan_kmalloc+0x9/0x10 [ 727.680764][T32704] ? __get_vm_area_node+0x13a/0x380 [ 727.685801][T32704] __get_vm_area_node+0x17b/0x380 [ 727.690661][T32704] __vmalloc_node_range+0xda/0x800 [ 727.695605][T32704] ? copy_process+0x579/0x3250 [ 727.700210][T32704] ? kmem_cache_alloc+0x1c1/0x2f0 [ 727.705071][T32704] ? dup_task_struct+0x53/0xa60 [ 727.709756][T32704] dup_task_struct+0x61f/0xa60 [ 727.714353][T32704] ? copy_process+0x579/0x3250 [ 727.718956][T32704] ? __kasan_check_write+0x14/0x20 [ 727.723901][T32704] copy_process+0x579/0x3250 [ 727.728329][T32704] ? __kasan_check_write+0x14/0x20 [ 727.733276][T32704] ? proc_fail_nth_write+0x213/0x290 [ 727.738395][T32704] ? proc_fail_nth_read+0x220/0x220 [ 727.743434][T32704] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 727.748377][T32704] ? vfs_write+0x9af/0x1050 [ 727.752721][T32704] ? vmacache_update+0xb7/0x120 [ 727.757408][T32704] kernel_clone+0x22d/0x990 [ 727.761751][T32704] ? file_end_write+0x1b0/0x1b0 [ 727.766434][T32704] ? __kasan_check_write+0x14/0x20 [ 727.771383][T32704] ? create_io_thread+0x1e0/0x1e0 [ 727.776246][T32704] ? __mutex_lock_slowpath+0x10/0x10 [ 727.781365][T32704] __x64_sys_clone+0x289/0x310 [ 727.785960][T32704] ? __do_sys_vfork+0x130/0x130 [ 727.790647][T32704] ? debug_smp_processor_id+0x17/0x20 [ 727.795863][T32704] do_syscall_64+0x44/0xd0 [ 727.800108][T32704] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 727.805837][T32704] RIP: 0033:0x7f14733430a9 [ 727.810101][T32704] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 727.829531][T32704] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 727.837776][T32704] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 727.845593][T32704] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 727.853397][T32704] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 727.861294][T32704] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 727.869113][T32704] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 727.876923][T32704] [ 727.885953][T32704] syz-executor.4: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 727.901674][T32704] CPU: 1 PID: 32704 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 727.911732][T32704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 727.921627][T32704] Call Trace: [ 727.924747][T32704] [ 727.927528][T32704] dump_stack_lvl+0x151/0x1b7 [ 727.932038][T32704] ? bfq_pos_tree_add_move+0x43e/0x43e [ 727.937332][T32704] ? pr_cont_kernfs_name+0xe6/0x100 [ 727.942370][T32704] dump_stack+0x15/0x17 [ 727.946360][T32704] warn_alloc+0x242/0x3d0 [ 727.950530][T32704] ? zone_watermark_ok_safe+0x280/0x280 [ 727.955907][T32704] ? __get_vm_area_node+0x190/0x380 [ 727.960940][T32704] __vmalloc_node_range+0x2be/0x800 [ 727.965975][T32704] ? dup_task_struct+0x53/0xa60 [ 727.970661][T32704] dup_task_struct+0x61f/0xa60 [ 727.975263][T32704] ? copy_process+0x579/0x3250 [ 727.979864][T32704] ? __kasan_check_write+0x14/0x20 [ 727.984811][T32704] copy_process+0x579/0x3250 [ 727.989235][T32704] ? __kasan_check_write+0x14/0x20 [ 727.994182][T32704] ? proc_fail_nth_write+0x213/0x290 [ 727.999302][T32704] ? proc_fail_nth_read+0x220/0x220 [ 728.004339][T32704] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 728.009283][T32704] ? vfs_write+0x9af/0x1050 [ 728.013630][T32704] ? vmacache_update+0xb7/0x120 [ 728.018320][T32704] kernel_clone+0x22d/0x990 [ 728.022650][T32704] ? file_end_write+0x1b0/0x1b0 [ 728.027341][T32704] ? __kasan_check_write+0x14/0x20 [ 728.032283][T32704] ? create_io_thread+0x1e0/0x1e0 [ 728.037154][T32704] ? __mutex_lock_slowpath+0x10/0x10 [ 728.042266][T32704] __x64_sys_clone+0x289/0x310 [ 728.046866][T32704] ? __do_sys_vfork+0x130/0x130 [ 728.051557][T32704] ? debug_smp_processor_id+0x17/0x20 [ 728.056762][T32704] do_syscall_64+0x44/0xd0 [ 728.061013][T32704] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 728.066745][T32704] RIP: 0033:0x7f14733430a9 [ 728.071001][T32704] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 728.090441][T32704] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 728.098682][T32704] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 728.106497][T32704] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 728.114308][T32704] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.122117][T32704] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 728.129928][T32704] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 728.137748][T32704] [ 728.140869][T32704] Mem-Info: [ 728.143888][T32704] active_anon:15456 inactive_anon:14524 isolated_anon:0 [ 728.143888][T32704] active_file:5644 inactive_file:8858 isolated_file:0 [ 728.143888][T32704] unevictable:0 dirty:204 writeback:0 [ 728.143888][T32704] slab_reclaimable:24335 slab_unreclaimable:70509 [ 728.143888][T32704] mapped:28682 shmem:15518 pagetables:533 bounce:0 [ 728.143888][T32704] kernel_misc_reclaimable:0 [ 728.143888][T32704] free:1521206 free_pcp:27760 free_cma:0 [ 728.187268][T32704] Node 0 active_anon:61824kB inactive_anon:58096kB active_file:22576kB inactive_file:35432kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:114728kB dirty:816kB writeback:0kB shmem:62072kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4480kB pagetables:2132kB all_unreclaimable? no [ 728.218738][T32704] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982424kB mlocked:0kB bounce:0kB free_pcp:5700kB local_pcp:5700kB free_cma:0kB [ 728.246070][T32704] lowmem_reserve[]: 0 3941 3941 [ 728.250920][T32704] Normal free:3108100kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:61824kB inactive_anon:58096kB active_file:22576kB inactive_file:35432kB unevictable:0kB writepending:816kB present:5242880kB managed:4035848kB mlocked:0kB bounce:0kB free_pcp:105336kB local_pcp:52816kB free_cma:0kB [ 728.280450][T32704] lowmem_reserve[]: 0 0 0 [ 728.284650][T32704] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB [ 728.300174][T32704] Normal: 25775*4kB (UME) 15985*8kB (UME) 10344*16kB (UME) 6420*32kB (UME) 2249*64kB (UME) 475*128kB (UME) 84*256kB (UME) 45*512kB (UME) 22*1024kB (UME) 3*2048kB (UME) 544*4096kB (M) = 3108100kB [ 728.319340][T32704] 30020 total pagecache pages [ 728.323864][T32704] 0 pages in swap cache [ 728.327846][T32704] Swap cache stats: add 0, delete 0, find 0/0 [ 728.333910][T32704] Free swap = 0kB [ 728.337468][T32704] Total swap = 0kB [ 728.341169][T32704] 2097051 pages RAM 23:31:01 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 7) 23:31:01 executing program 0: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:01 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:01 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:01 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:01 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:01 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:01 executing program 0: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 728.344823][T32704] 0 pages HighMem/MovableOnly [ 728.349376][T32704] 342483 pages reserved [ 728.353303][T32704] 0 pages cma reserved 23:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:01 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:01 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 728.396452][T32731] FAULT_INJECTION: forcing a failure. [ 728.396452][T32731] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 728.435388][T32731] CPU: 1 PID: 32731 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 728.445457][T32731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 728.455351][T32731] Call Trace: [ 728.458473][T32731] [ 728.461252][T32731] dump_stack_lvl+0x151/0x1b7 [ 728.465764][T32731] ? bfq_pos_tree_add_move+0x43e/0x43e [ 728.471060][T32731] dump_stack+0x15/0x17 [ 728.475052][T32731] should_fail+0x3c0/0x510 [ 728.479304][T32731] should_fail_alloc_page+0x58/0x70 [ 728.484339][T32731] __alloc_pages+0x1de/0x7c0 [ 728.488769][T32731] ? __count_vm_events+0x30/0x30 [ 728.493539][T32731] ? __kasan_kmalloc+0x9/0x10 [ 728.498060][T32731] ? __kmalloc+0x203/0x350 [ 728.502306][T32731] ? __vmalloc_node_range+0x2e3/0x800 [ 728.507514][T32731] __vmalloc_node_range+0x48f/0x800 [ 728.512548][T32731] dup_task_struct+0x61f/0xa60 [ 728.517145][T32731] ? copy_process+0x579/0x3250 [ 728.521747][T32731] ? __kasan_check_write+0x14/0x20 [ 728.526694][T32731] copy_process+0x579/0x3250 [ 728.531121][T32731] ? __kasan_check_write+0x14/0x20 [ 728.536069][T32731] ? proc_fail_nth_write+0x213/0x290 [ 728.541188][T32731] ? proc_fail_nth_read+0x220/0x220 [ 728.546230][T32731] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 728.551171][T32731] ? vfs_write+0x9af/0x1050 [ 728.555508][T32731] ? vmacache_update+0xb7/0x120 [ 728.560203][T32731] kernel_clone+0x22d/0x990 [ 728.564536][T32731] ? file_end_write+0x1b0/0x1b0 [ 728.569226][T32731] ? __kasan_check_write+0x14/0x20 [ 728.574172][T32731] ? create_io_thread+0x1e0/0x1e0 [ 728.579032][T32731] ? __mutex_lock_slowpath+0x10/0x10 [ 728.584152][T32731] __x64_sys_clone+0x289/0x310 [ 728.588753][T32731] ? __do_sys_vfork+0x130/0x130 [ 728.593439][T32731] ? debug_smp_processor_id+0x17/0x20 [ 728.598652][T32731] do_syscall_64+0x44/0xd0 [ 728.602898][T32731] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 728.608626][T32731] RIP: 0033:0x7f14733430a9 [ 728.612880][T32731] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 728.632322][T32731] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:02 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 8) 23:31:02 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:02 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:02 executing program 0: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 728.640565][T32731] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 728.648380][T32731] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 728.656190][T32731] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.664007][T32731] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 728.671813][T32731] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 728.679711][T32731] 23:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 728.741204][T32762] FAULT_INJECTION: forcing a failure. [ 728.741204][T32762] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 728.763809][T32762] CPU: 1 PID: 32762 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 728.773879][T32762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 728.783770][T32762] Call Trace: [ 728.786893][T32762] [ 728.789668][T32762] dump_stack_lvl+0x151/0x1b7 [ 728.794184][T32762] ? bfq_pos_tree_add_move+0x43e/0x43e [ 728.799477][T32762] dump_stack+0x15/0x17 [ 728.803476][T32762] should_fail+0x3c0/0x510 [ 728.807725][T32762] should_fail_alloc_page+0x58/0x70 [ 728.812754][T32762] __alloc_pages+0x1de/0x7c0 [ 728.817182][T32762] ? __count_vm_events+0x30/0x30 [ 728.821956][T32762] ? __kasan_kmalloc+0x9/0x10 [ 728.826470][T32762] ? __kmalloc+0x203/0x350 [ 728.830728][T32762] ? __vmalloc_node_range+0x2e3/0x800 [ 728.835929][T32762] __vmalloc_node_range+0x48f/0x800 [ 728.840966][T32762] dup_task_struct+0x61f/0xa60 [ 728.845561][T32762] ? copy_process+0x579/0x3250 [ 728.850161][T32762] ? __kasan_check_write+0x14/0x20 [ 728.855109][T32762] copy_process+0x579/0x3250 [ 728.859537][T32762] ? __kasan_check_write+0x14/0x20 [ 728.864488][T32762] ? proc_fail_nth_write+0x213/0x290 [ 728.869604][T32762] ? proc_fail_nth_read+0x220/0x220 [ 728.874638][T32762] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 728.879584][T32762] ? vfs_write+0x9af/0x1050 [ 728.883924][T32762] ? vmacache_update+0xb7/0x120 [ 728.888611][T32762] kernel_clone+0x22d/0x990 [ 728.892952][T32762] ? file_end_write+0x1b0/0x1b0 [ 728.897638][T32762] ? __kasan_check_write+0x14/0x20 [ 728.902588][T32762] ? create_io_thread+0x1e0/0x1e0 [ 728.907447][T32762] ? __mutex_lock_slowpath+0x10/0x10 [ 728.912568][T32762] __x64_sys_clone+0x289/0x310 [ 728.917167][T32762] ? __do_sys_vfork+0x130/0x130 [ 728.921854][T32762] ? debug_smp_processor_id+0x17/0x20 [ 728.927061][T32762] do_syscall_64+0x44/0xd0 [ 728.931315][T32762] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 728.937043][T32762] RIP: 0033:0x7f14733430a9 [ 728.941297][T32762] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 728.960736][T32762] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 728.968996][T32762] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 728.976798][T32762] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 728.984605][T32762] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:02 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 9) 23:31:02 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:02 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000400000000000000020000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) [ 728.992417][T32762] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 729.000231][T32762] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 729.008048][T32762] 23:31:02 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:02 executing program 0: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) [ 729.039108][ T309] FAULT_INJECTION: forcing a failure. [ 729.039108][ T309] name failslab, interval 1, probability 0, space 0, times 0 [ 729.098530][ T309] CPU: 1 PID: 309 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 729.108436][ T309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 729.118327][ T309] Call Trace: [ 729.121448][ T309] [ 729.124223][ T309] dump_stack_lvl+0x151/0x1b7 [ 729.128740][ T309] ? bfq_pos_tree_add_move+0x43e/0x43e [ 729.134049][ T309] dump_stack+0x15/0x17 [ 729.138030][ T309] should_fail+0x3c0/0x510 [ 729.142276][ T309] __should_failslab+0x9f/0xe0 [ 729.146873][ T309] should_failslab+0x9/0x20 [ 729.151213][ T309] kmem_cache_alloc+0x4f/0x2f0 [ 729.155812][ T309] ? copy_sighand+0x54/0x250 [ 729.160237][ T309] ? _raw_spin_unlock+0x4d/0x70 [ 729.164924][ T309] copy_sighand+0x54/0x250 [ 729.169178][ T309] copy_process+0x123f/0x3250 [ 729.173695][ T309] ? proc_fail_nth_write+0x213/0x290 [ 729.178813][ T309] ? proc_fail_nth_read+0x220/0x220 [ 729.183848][ T309] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 729.188798][ T309] ? vfs_write+0x9af/0x1050 [ 729.193139][ T309] ? vmacache_update+0xb7/0x120 [ 729.197821][ T309] kernel_clone+0x22d/0x990 [ 729.202161][ T309] ? file_end_write+0x1b0/0x1b0 [ 729.206847][ T309] ? __kasan_check_write+0x14/0x20 [ 729.211794][ T309] ? create_io_thread+0x1e0/0x1e0 [ 729.216655][ T309] ? __mutex_lock_slowpath+0x10/0x10 [ 729.221778][ T309] __x64_sys_clone+0x289/0x310 [ 729.226466][ T309] ? __do_sys_vfork+0x130/0x130 [ 729.231411][ T309] ? debug_smp_processor_id+0x17/0x20 [ 729.236617][ T309] do_syscall_64+0x44/0xd0 [ 729.240870][ T309] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 729.246597][ T309] RIP: 0033:0x7f14733430a9 [ 729.250855][ T309] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 729.270292][ T309] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 729.278538][ T309] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 729.286349][ T309] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:02 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 10) 23:31:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:02 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 0: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], 0x0, 0x5c, 0x0, 0x1}, 0x20) [ 729.294160][ T309] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 729.301993][ T309] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 729.309784][ T309] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 729.317597][ T309] 23:31:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:02 executing program 0: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:31:02 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 729.347962][ T336] FAULT_INJECTION: forcing a failure. [ 729.347962][ T336] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 729.370353][ T336] CPU: 1 PID: 336 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 729.380251][ T336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 729.390151][ T336] Call Trace: [ 729.393277][ T336] [ 729.396047][ T336] dump_stack_lvl+0x151/0x1b7 [ 729.400562][ T336] ? bfq_pos_tree_add_move+0x43e/0x43e [ 729.405856][ T336] dump_stack+0x15/0x17 [ 729.409847][ T336] should_fail+0x3c0/0x510 [ 729.414104][ T336] should_fail_alloc_page+0x58/0x70 [ 729.419133][ T336] __alloc_pages+0x1de/0x7c0 [ 729.423559][ T336] ? __count_vm_events+0x30/0x30 [ 729.428338][ T336] ? __kasan_kmalloc+0x9/0x10 [ 729.432843][ T336] ? __kmalloc+0x203/0x350 [ 729.437099][ T336] ? __vmalloc_node_range+0x2e3/0x800 [ 729.442303][ T336] __vmalloc_node_range+0x48f/0x800 [ 729.447337][ T336] dup_task_struct+0x61f/0xa60 [ 729.451936][ T336] ? copy_process+0x579/0x3250 [ 729.456537][ T336] ? __kasan_check_write+0x14/0x20 [ 729.461485][ T336] copy_process+0x579/0x3250 [ 729.465912][ T336] ? __kasan_check_write+0x14/0x20 [ 729.470997][ T336] ? proc_fail_nth_write+0x213/0x290 [ 729.476114][ T336] ? proc_fail_nth_read+0x220/0x220 [ 729.481168][ T336] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 729.486090][ T336] ? vfs_write+0x9af/0x1050 [ 729.490429][ T336] ? vmacache_update+0xb7/0x120 [ 729.495122][ T336] kernel_clone+0x22d/0x990 [ 729.499462][ T336] ? file_end_write+0x1b0/0x1b0 [ 729.504144][ T336] ? __kasan_check_write+0x14/0x20 [ 729.509093][ T336] ? create_io_thread+0x1e0/0x1e0 [ 729.513956][ T336] ? __mutex_lock_slowpath+0x10/0x10 [ 729.519072][ T336] __x64_sys_clone+0x289/0x310 [ 729.523672][ T336] ? __do_sys_vfork+0x130/0x130 [ 729.528359][ T336] ? debug_smp_processor_id+0x17/0x20 [ 729.533568][ T336] do_syscall_64+0x44/0xd0 [ 729.537821][ T336] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 729.543546][ T336] RIP: 0033:0x7f14733430a9 [ 729.547802][ T336] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 729.567242][ T336] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 729.575486][ T336] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 729.583312][ T336] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 729.591115][ T336] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:03 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 11) 23:31:03 executing program 0: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:31:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 729.598924][ T336] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 729.606734][ T336] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 729.614545][ T336] 23:31:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000004000000000000000200000d"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:31:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:03 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:03 executing program 0: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 729.648195][ T362] FAULT_INJECTION: forcing a failure. [ 729.648195][ T362] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 729.687172][ T362] CPU: 0 PID: 362 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 729.697066][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 729.706960][ T362] Call Trace: [ 729.710082][ T362] [ 729.712861][ T362] dump_stack_lvl+0x151/0x1b7 [ 729.717383][ T362] ? bfq_pos_tree_add_move+0x43e/0x43e [ 729.722673][ T362] dump_stack+0x15/0x17 [ 729.726664][ T362] should_fail+0x3c0/0x510 [ 729.730915][ T362] should_fail_alloc_page+0x58/0x70 [ 729.735967][ T362] __alloc_pages+0x1de/0x7c0 [ 729.740392][ T362] ? __count_vm_events+0x30/0x30 [ 729.745149][ T362] ? __kasan_kmalloc+0x9/0x10 [ 729.749662][ T362] ? __kmalloc+0x203/0x350 [ 729.753914][ T362] ? __vmalloc_node_range+0x2e3/0x800 [ 729.759123][ T362] __vmalloc_node_range+0x48f/0x800 [ 729.764159][ T362] dup_task_struct+0x61f/0xa60 [ 729.768756][ T362] ? copy_process+0x579/0x3250 [ 729.773357][ T362] ? __kasan_check_write+0x14/0x20 [ 729.778308][ T362] copy_process+0x579/0x3250 [ 729.782733][ T362] ? __kasan_check_write+0x14/0x20 [ 729.787676][ T362] ? proc_fail_nth_write+0x213/0x290 [ 729.792799][ T362] ? proc_fail_nth_read+0x220/0x220 [ 729.797839][ T362] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 729.802783][ T362] ? vfs_write+0x9af/0x1050 [ 729.807119][ T362] ? vmacache_update+0xb7/0x120 [ 729.811805][ T362] kernel_clone+0x22d/0x990 [ 729.816146][ T362] ? file_end_write+0x1b0/0x1b0 [ 729.820831][ T362] ? __kasan_check_write+0x14/0x20 [ 729.825780][ T362] ? create_io_thread+0x1e0/0x1e0 [ 729.830651][ T362] ? __mutex_lock_slowpath+0x10/0x10 [ 729.836023][ T362] __x64_sys_clone+0x289/0x310 [ 729.840622][ T362] ? __do_sys_vfork+0x130/0x130 [ 729.845309][ T362] ? debug_smp_processor_id+0x17/0x20 [ 729.850517][ T362] do_syscall_64+0x44/0xd0 [ 729.854768][ T362] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 729.860496][ T362] RIP: 0033:0x7f14733430a9 [ 729.864752][ T362] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 729.884194][ T362] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:03 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 12) 23:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:03 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:03 executing program 0: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 729.892438][ T362] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 729.900249][ T362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 729.908058][ T362] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 729.915870][ T362] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 729.923681][ T362] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 729.931497][ T362] 23:31:03 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 0: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 729.950671][ T380] FAULT_INJECTION: forcing a failure. [ 729.950671][ T380] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 729.971780][ T380] CPU: 0 PID: 380 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 729.981673][ T380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 729.991568][ T380] Call Trace: [ 729.994690][ T380] 23:31:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:03 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 729.997466][ T380] dump_stack_lvl+0x151/0x1b7 [ 730.001983][ T380] ? bfq_pos_tree_add_move+0x43e/0x43e [ 730.007287][ T380] dump_stack+0x15/0x17 [ 730.011265][ T380] should_fail+0x3c0/0x510 [ 730.015527][ T380] should_fail_alloc_page+0x58/0x70 [ 730.020554][ T380] __alloc_pages+0x1de/0x7c0 [ 730.024983][ T380] ? __count_vm_events+0x30/0x30 [ 730.029755][ T380] ? __kasan_kmalloc+0x9/0x10 [ 730.034276][ T380] ? __kmalloc+0x203/0x350 [ 730.038521][ T380] ? __vmalloc_node_range+0x2e3/0x800 [ 730.043727][ T380] __vmalloc_node_range+0x48f/0x800 [ 730.048764][ T380] dup_task_struct+0x61f/0xa60 [ 730.053362][ T380] ? copy_process+0x579/0x3250 [ 730.058000][ T380] ? __kasan_check_write+0x14/0x20 [ 730.062909][ T380] copy_process+0x579/0x3250 [ 730.067338][ T380] ? __kasan_check_write+0x14/0x20 [ 730.072284][ T380] ? proc_fail_nth_write+0x213/0x290 [ 730.077404][ T380] ? proc_fail_nth_read+0x220/0x220 [ 730.082436][ T380] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 730.087379][ T380] ? vfs_write+0x9af/0x1050 [ 730.091721][ T380] ? vmacache_update+0xb7/0x120 [ 730.096408][ T380] kernel_clone+0x22d/0x990 [ 730.100748][ T380] ? file_end_write+0x1b0/0x1b0 [ 730.105435][ T380] ? __kasan_check_write+0x14/0x20 [ 730.110486][ T380] ? create_io_thread+0x1e0/0x1e0 [ 730.115441][ T380] ? __mutex_lock_slowpath+0x10/0x10 [ 730.120556][ T380] __x64_sys_clone+0x289/0x310 [ 730.125157][ T380] ? __do_sys_vfork+0x130/0x130 [ 730.129850][ T380] ? debug_smp_processor_id+0x17/0x20 [ 730.135050][ T380] do_syscall_64+0x44/0xd0 [ 730.139303][ T380] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 730.145032][ T380] RIP: 0033:0x7f14733430a9 [ 730.149290][ T380] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 730.168727][ T380] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 730.176973][ T380] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 730.184781][ T380] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 730.192595][ T380] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:03 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 13) 23:31:03 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:03 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 0: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 2: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) [ 730.200665][ T380] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 730.208575][ T380] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 730.216375][ T380] [ 730.229149][ T408] FAULT_INJECTION: forcing a failure. [ 730.229149][ T408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:31:03 executing program 0: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:03 executing program 1: bpf$BPF_BTF_LOAD(0x11, 0x0, 0x0) [ 730.254558][ T408] CPU: 0 PID: 408 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 730.264461][ T408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 730.274441][ T408] Call Trace: [ 730.277562][ T408] [ 730.280346][ T408] dump_stack_lvl+0x151/0x1b7 [ 730.284855][ T408] ? bfq_pos_tree_add_move+0x43e/0x43e [ 730.290157][ T408] dump_stack+0x15/0x17 [ 730.294141][ T408] should_fail+0x3c0/0x510 [ 730.298396][ T408] should_fail_alloc_page+0x58/0x70 [ 730.303433][ T408] __alloc_pages+0x1de/0x7c0 [ 730.307857][ T408] ? __count_vm_events+0x30/0x30 [ 730.312630][ T408] ? __kasan_kmalloc+0x9/0x10 [ 730.317142][ T408] ? __kmalloc+0x203/0x350 [ 730.321394][ T408] ? __vmalloc_node_range+0x2e3/0x800 [ 730.326609][ T408] __vmalloc_node_range+0x48f/0x800 [ 730.331734][ T408] dup_task_struct+0x61f/0xa60 [ 730.336321][ T408] ? copy_process+0x579/0x3250 [ 730.340923][ T408] ? __kasan_check_write+0x14/0x20 [ 730.345870][ T408] copy_process+0x579/0x3250 [ 730.350297][ T408] ? __kasan_check_write+0x14/0x20 [ 730.355243][ T408] ? proc_fail_nth_write+0x213/0x290 [ 730.360360][ T408] ? proc_fail_nth_read+0x220/0x220 [ 730.365394][ T408] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 730.370343][ T408] ? vfs_write+0x9af/0x1050 [ 730.374681][ T408] ? vmacache_update+0xb7/0x120 [ 730.379369][ T408] kernel_clone+0x22d/0x990 [ 730.383707][ T408] ? file_end_write+0x1b0/0x1b0 [ 730.388395][ T408] ? __kasan_check_write+0x14/0x20 [ 730.393342][ T408] ? create_io_thread+0x1e0/0x1e0 [ 730.398203][ T408] ? __mutex_lock_slowpath+0x10/0x10 [ 730.403329][ T408] __x64_sys_clone+0x289/0x310 [ 730.407954][ T408] ? __do_sys_vfork+0x130/0x130 [ 730.412611][ T408] ? debug_smp_processor_id+0x17/0x20 [ 730.417819][ T408] do_syscall_64+0x44/0xd0 [ 730.422071][ T408] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 730.427798][ T408] RIP: 0033:0x7f14733430a9 [ 730.432054][ T408] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:31:03 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 14) 23:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 1: bpf$BPF_BTF_LOAD(0x11, 0x0, 0x0) 23:31:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:03 executing program 0: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:03 executing program 2: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) [ 730.451493][ T408] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 730.459737][ T408] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 730.467551][ T408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 730.475369][ T408] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 730.483172][ T408] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 730.490985][ T408] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 730.498797][ T408] 23:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000001000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 730.511954][ T445] FAULT_INJECTION: forcing a failure. [ 730.511954][ T445] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 730.528232][ T445] CPU: 0 PID: 445 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 730.538127][ T445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 730.548022][ T445] Call Trace: [ 730.551147][ T445] [ 730.554007][ T445] dump_stack_lvl+0x151/0x1b7 23:31:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 730.558524][ T445] ? bfq_pos_tree_add_move+0x43e/0x43e [ 730.563820][ T445] dump_stack+0x15/0x17 [ 730.567807][ T445] should_fail+0x3c0/0x510 [ 730.572063][ T445] should_fail_alloc_page+0x58/0x70 [ 730.577098][ T445] __alloc_pages+0x1de/0x7c0 [ 730.581523][ T445] ? __count_vm_events+0x30/0x30 [ 730.586307][ T445] ? __kasan_kmalloc+0x9/0x10 [ 730.590809][ T445] ? __kmalloc+0x203/0x350 [ 730.595064][ T445] ? __vmalloc_node_range+0x2e3/0x800 [ 730.600272][ T445] __vmalloc_node_range+0x48f/0x800 [ 730.605307][ T445] dup_task_struct+0x61f/0xa60 [ 730.609906][ T445] ? copy_process+0x579/0x3250 [ 730.614502][ T445] ? __kasan_check_write+0x14/0x20 [ 730.619454][ T445] copy_process+0x579/0x3250 [ 730.623878][ T445] ? __kasan_check_write+0x14/0x20 [ 730.628822][ T445] ? proc_fail_nth_write+0x213/0x290 [ 730.633944][ T445] ? proc_fail_nth_read+0x220/0x220 [ 730.638975][ T445] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 730.643924][ T445] ? vfs_write+0x9af/0x1050 [ 730.648261][ T445] ? vmacache_update+0xb7/0x120 [ 730.652952][ T445] kernel_clone+0x22d/0x990 [ 730.657299][ T445] ? file_end_write+0x1b0/0x1b0 [ 730.661975][ T445] ? __kasan_check_write+0x14/0x20 [ 730.666924][ T445] ? create_io_thread+0x1e0/0x1e0 [ 730.671781][ T445] ? __mutex_lock_slowpath+0x10/0x10 [ 730.676905][ T445] __x64_sys_clone+0x289/0x310 [ 730.681502][ T445] ? __do_sys_vfork+0x130/0x130 [ 730.686191][ T445] ? debug_smp_processor_id+0x17/0x20 [ 730.691398][ T445] do_syscall_64+0x44/0xd0 [ 730.695652][ T445] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 730.701377][ T445] RIP: 0033:0x7f14733430a9 [ 730.705641][ T445] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 730.725074][ T445] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 730.733321][ T445] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 730.741130][ T445] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 730.748942][ T445] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:04 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 15) 23:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000010000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:04 executing program 1: bpf$BPF_BTF_LOAD(0x11, 0x0, 0x0) 23:31:04 executing program 0: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 2: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 23:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000100000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:04 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000180)={0x0, 0x0, 0x5c, 0x0, 0x1}, 0x20) [ 730.756752][ T445] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 730.764565][ T445] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 730.772376][ T445] [ 730.791450][ T474] FAULT_INJECTION: forcing a failure. [ 730.791450][ T474] name failslab, interval 1, probability 0, space 0, times 0 [ 730.814382][ T474] CPU: 1 PID: 474 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 730.824285][ T474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 730.834183][ T474] Call Trace: [ 730.837300][ T474] [ 730.840078][ T474] dump_stack_lvl+0x151/0x1b7 [ 730.844595][ T474] ? bfq_pos_tree_add_move+0x43e/0x43e [ 730.849892][ T474] ? __this_cpu_preempt_check+0x13/0x20 [ 730.855267][ T474] dump_stack+0x15/0x17 [ 730.859256][ T474] should_fail+0x3c0/0x510 23:31:04 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000180)={0x0, 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:31:04 executing program 0: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 730.863511][ T474] __should_failslab+0x9f/0xe0 [ 730.868107][ T474] should_failslab+0x9/0x20 [ 730.872449][ T474] kmem_cache_alloc+0x4f/0x2f0 [ 730.877054][ T474] ? __kasan_check_write+0x14/0x20 [ 730.882004][ T474] ? prepare_creds+0x30/0x690 [ 730.886511][ T474] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 730.891807][ T474] prepare_creds+0x30/0x690 [ 730.896149][ T474] copy_creds+0xde/0x640 [ 730.900228][ T474] copy_process+0x775/0x3250 [ 730.904651][ T474] ? __kasan_check_write+0x14/0x20 [ 730.909595][ T474] ? proc_fail_nth_write+0x213/0x290 [ 730.914714][ T474] ? proc_fail_nth_read+0x220/0x220 [ 730.919748][ T474] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 730.924696][ T474] ? vfs_write+0x9af/0x1050 [ 730.929040][ T474] ? vmacache_update+0xb7/0x120 [ 730.933721][ T474] kernel_clone+0x22d/0x990 [ 730.938063][ T474] ? file_end_write+0x1b0/0x1b0 [ 730.942748][ T474] ? __kasan_check_write+0x14/0x20 [ 730.947700][ T474] ? create_io_thread+0x1e0/0x1e0 [ 730.952559][ T474] ? __mutex_lock_slowpath+0x10/0x10 [ 730.957698][ T474] __x64_sys_clone+0x289/0x310 [ 730.962281][ T474] ? __do_sys_vfork+0x130/0x130 [ 730.966971][ T474] ? debug_smp_processor_id+0x17/0x20 [ 730.972173][ T474] do_syscall_64+0x44/0xd0 [ 730.976539][ T474] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 730.982267][ T474] RIP: 0033:0x7f14733430a9 [ 730.986516][ T474] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 731.005962][ T474] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:04 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 16) 23:31:04 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000180)={0x0, 0x0, 0x5c}, 0x20) 23:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:04 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000180)={0x0, 0x0, 0x5c}, 0x20) 23:31:04 executing program 0: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 731.014291][ T474] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 731.022102][ T474] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 731.029912][ T474] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 731.037722][ T474] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 731.045536][ T474] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 731.053349][ T474] 23:31:04 executing program 0: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 2: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 731.076252][ T505] FAULT_INJECTION: forcing a failure. [ 731.076252][ T505] name failslab, interval 1, probability 0, space 0, times 0 [ 731.103325][ T505] CPU: 1 PID: 505 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 731.113225][ T505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 731.123123][ T505] Call Trace: [ 731.126241][ T505] [ 731.129016][ T505] dump_stack_lvl+0x151/0x1b7 [ 731.133532][ T505] ? bfq_pos_tree_add_move+0x43e/0x43e [ 731.138826][ T505] dump_stack+0x15/0x17 [ 731.142990][ T505] should_fail+0x3c0/0x510 [ 731.147253][ T505] __should_failslab+0x9f/0xe0 [ 731.151845][ T505] should_failslab+0x9/0x20 [ 731.156187][ T505] kmem_cache_alloc+0x4f/0x2f0 [ 731.160786][ T505] ? vm_area_dup+0x26/0x1d0 [ 731.165136][ T505] ? __kasan_check_read+0x11/0x20 [ 731.169984][ T505] vm_area_dup+0x26/0x1d0 [ 731.174149][ T505] dup_mmap+0x6b8/0xea0 [ 731.178141][ T505] ? __delayed_free_task+0x20/0x20 [ 731.183089][ T505] ? mm_init+0x807/0x960 [ 731.187167][ T505] dup_mm+0x91/0x330 [ 731.190902][ T505] copy_mm+0x108/0x1b0 [ 731.194817][ T505] copy_process+0x1295/0x3250 [ 731.199330][ T505] ? proc_fail_nth_write+0x213/0x290 [ 731.204444][ T505] ? proc_fail_nth_read+0x220/0x220 [ 731.209473][ T505] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 731.214422][ T505] ? vfs_write+0x9af/0x1050 [ 731.218760][ T505] ? vmacache_update+0xb7/0x120 [ 731.223447][ T505] kernel_clone+0x22d/0x990 [ 731.227791][ T505] ? file_end_write+0x1b0/0x1b0 [ 731.232474][ T505] ? __kasan_check_write+0x14/0x20 [ 731.237420][ T505] ? create_io_thread+0x1e0/0x1e0 [ 731.242283][ T505] ? __mutex_lock_slowpath+0x10/0x10 [ 731.247409][ T505] __x64_sys_clone+0x289/0x310 [ 731.252004][ T505] ? __do_sys_vfork+0x130/0x130 [ 731.256690][ T505] ? debug_smp_processor_id+0x17/0x20 [ 731.261898][ T505] do_syscall_64+0x44/0xd0 [ 731.266151][ T505] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 731.271878][ T505] RIP: 0033:0x7f14733430a9 [ 731.276132][ T505] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 731.295575][ T505] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 731.303817][ T505] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 731.311632][ T505] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 731.319440][ T505] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:04 executing program 2: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 17) 23:31:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1000010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 2: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1001, 0x8d, 0x1}, 0x20) [ 731.327252][ T505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 731.335063][ T505] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 731.342878][ T505] 23:31:04 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb020018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:04 executing program 2: bpf$BPF_BTF_LOAD(0x1d, 0x0, 0x0) 23:31:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 731.417927][ T537] FAULT_INJECTION: forcing a failure. [ 731.417927][ T537] name failslab, interval 1, probability 0, space 0, times 0 [ 731.448721][ T537] CPU: 0 PID: 537 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 731.458634][ T537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 731.468521][ T537] Call Trace: [ 731.471640][ T537] [ 731.474418][ T537] dump_stack_lvl+0x151/0x1b7 [ 731.478943][ T537] ? bfq_pos_tree_add_move+0x43e/0x43e [ 731.484232][ T537] dump_stack+0x15/0x17 [ 731.488228][ T537] should_fail+0x3c0/0x510 [ 731.492467][ T537] __should_failslab+0x9f/0xe0 [ 731.497067][ T537] should_failslab+0x9/0x20 [ 731.501408][ T537] kmem_cache_alloc+0x4f/0x2f0 [ 731.506007][ T537] ? vm_area_dup+0x26/0x1d0 [ 731.510346][ T537] vm_area_dup+0x26/0x1d0 [ 731.514512][ T537] dup_mmap+0x6b8/0xea0 [ 731.518507][ T537] ? __delayed_free_task+0x20/0x20 [ 731.523455][ T537] ? mm_init+0x807/0x960 [ 731.527532][ T537] dup_mm+0x91/0x330 [ 731.531265][ T537] copy_mm+0x108/0x1b0 [ 731.535170][ T537] copy_process+0x1295/0x3250 [ 731.539688][ T537] ? proc_fail_nth_write+0x213/0x290 [ 731.544803][ T537] ? proc_fail_nth_read+0x220/0x220 [ 731.549837][ T537] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 731.554790][ T537] ? vfs_write+0x9af/0x1050 [ 731.559123][ T537] ? vmacache_update+0xb7/0x120 [ 731.563812][ T537] kernel_clone+0x22d/0x990 [ 731.568150][ T537] ? file_end_write+0x1b0/0x1b0 [ 731.572837][ T537] ? __kasan_check_write+0x14/0x20 [ 731.577787][ T537] ? create_io_thread+0x1e0/0x1e0 [ 731.582644][ T537] ? __mutex_lock_slowpath+0x10/0x10 [ 731.588297][ T537] __x64_sys_clone+0x289/0x310 [ 731.592887][ T537] ? __do_sys_vfork+0x130/0x130 [ 731.597576][ T537] ? debug_smp_processor_id+0x17/0x20 [ 731.602788][ T537] do_syscall_64+0x44/0xd0 [ 731.607037][ T537] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 731.612769][ T537] RIP: 0033:0x7f14733430a9 [ 731.617027][ T537] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 731.636460][ T537] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 731.644796][ T537] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 731.652600][ T537] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 731.660504][ T537] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:05 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 18) 23:31:05 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:05 executing program 1: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 23:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb080018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:05 executing program 2: bpf$BPF_BTF_LOAD(0x1d, 0x0, 0x0) 23:31:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x2}, 0x20) 23:31:05 executing program 2: bpf$BPF_BTF_LOAD(0x1d, 0x0, 0x0) 23:31:05 executing program 1: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 23:31:05 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0a0018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 731.668399][ T537] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 731.676295][ T537] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 731.684117][ T537] 23:31:05 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 731.729778][ T560] FAULT_INJECTION: forcing a failure. [ 731.729778][ T560] name failslab, interval 1, probability 0, space 0, times 0 [ 731.742873][ T560] CPU: 1 PID: 560 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 731.752765][ T560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 731.762659][ T560] Call Trace: [ 731.765781][ T560] [ 731.768558][ T560] dump_stack_lvl+0x151/0x1b7 [ 731.773090][ T560] ? bfq_pos_tree_add_move+0x43e/0x43e [ 731.778370][ T560] dump_stack+0x15/0x17 [ 731.782369][ T560] should_fail+0x3c0/0x510 [ 731.786755][ T560] __should_failslab+0x9f/0xe0 [ 731.791349][ T560] should_failslab+0x9/0x20 [ 731.795685][ T560] kmem_cache_alloc+0x4f/0x2f0 [ 731.800283][ T560] ? vm_area_dup+0x26/0x1d0 [ 731.804622][ T560] ? __kasan_check_read+0x11/0x20 [ 731.809482][ T560] vm_area_dup+0x26/0x1d0 [ 731.813651][ T560] dup_mmap+0x6b8/0xea0 [ 731.817645][ T560] ? __delayed_free_task+0x20/0x20 [ 731.822592][ T560] ? mm_init+0x807/0x960 [ 731.826668][ T560] dup_mm+0x91/0x330 [ 731.830400][ T560] copy_mm+0x108/0x1b0 [ 731.834306][ T560] copy_process+0x1295/0x3250 [ 731.838908][ T560] ? proc_fail_nth_write+0x213/0x290 [ 731.844036][ T560] ? proc_fail_nth_read+0x220/0x220 [ 731.849066][ T560] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 731.854008][ T560] ? vfs_write+0x9af/0x1050 [ 731.858355][ T560] ? vmacache_update+0xb7/0x120 [ 731.863037][ T560] kernel_clone+0x22d/0x990 [ 731.867373][ T560] ? file_end_write+0x1b0/0x1b0 [ 731.872059][ T560] ? __kasan_check_write+0x14/0x20 [ 731.877008][ T560] ? create_io_thread+0x1e0/0x1e0 [ 731.881869][ T560] ? __mutex_lock_slowpath+0x10/0x10 [ 731.886995][ T560] __x64_sys_clone+0x289/0x310 [ 731.891589][ T560] ? __do_sys_vfork+0x130/0x130 [ 731.896284][ T560] ? debug_smp_processor_id+0x17/0x20 [ 731.901482][ T560] do_syscall_64+0x44/0xd0 [ 731.905740][ T560] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 731.911470][ T560] RIP: 0033:0x7f14733430a9 [ 731.915738][ T560] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 731.935167][ T560] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 731.943404][ T560] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 731.951216][ T560] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 731.959028][ T560] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 731.966847][ T560] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x4}, 0x20) 23:31:05 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 19) 23:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb180018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:05 executing program 2: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000180)={0x0, 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:31:05 executing program 1: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 23:31:05 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 731.974650][ T560] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 731.982464][ T560] 23:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9febee0318"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x8}, 0x20) 23:31:05 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, 0x0, 0x5c, 0x0, 0x1}, 0x20) [ 732.015870][ T574] FAULT_INJECTION: forcing a failure. [ 732.015870][ T574] name failslab, interval 1, probability 0, space 0, times 0 [ 732.041254][ T574] CPU: 0 PID: 574 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 732.051168][ T574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 732.061067][ T574] Call Trace: 23:31:05 executing program 2: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000180)={0x0, 0x0, 0x5c}, 0x20) 23:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9febf30318"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:05 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, 0x0, 0x5c}, 0x20) 23:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9febf50318"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 732.064187][ T574] [ 732.067004][ T574] dump_stack_lvl+0x151/0x1b7 [ 732.071478][ T574] ? bfq_pos_tree_add_move+0x43e/0x43e [ 732.076776][ T574] dump_stack+0x15/0x17 [ 732.080766][ T574] should_fail+0x3c0/0x510 [ 732.085037][ T574] ? kvmalloc_node+0x82/0x130 [ 732.089546][ T574] __should_failslab+0x9f/0xe0 [ 732.094132][ T574] should_failslab+0x9/0x20 [ 732.098475][ T574] __kmalloc+0x6d/0x350 [ 732.102465][ T574] ? __kasan_kmalloc+0x9/0x10 [ 732.106985][ T574] kvmalloc_node+0x82/0x130 [ 732.111317][ T574] alloc_fdtable+0xea/0x2b0 [ 732.115653][ T574] dup_fd+0x781/0xa40 [ 732.119471][ T574] ? avc_has_perm+0x16d/0x260 [ 732.123990][ T574] copy_files+0xe6/0x200 [ 732.128063][ T574] ? perf_event_attrs+0x30/0x30 [ 732.132755][ T574] ? dup_task_struct+0xa60/0xa60 [ 732.137526][ T574] ? security_task_alloc+0x132/0x150 [ 732.142645][ T574] copy_process+0x11e9/0x3250 [ 732.147159][ T574] ? proc_fail_nth_write+0x213/0x290 [ 732.152277][ T574] ? proc_fail_nth_read+0x220/0x220 [ 732.157312][ T574] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 732.162261][ T574] ? vfs_write+0x9af/0x1050 [ 732.166600][ T574] ? vmacache_update+0xb7/0x120 [ 732.171286][ T574] kernel_clone+0x22d/0x990 [ 732.175625][ T574] ? file_end_write+0x1b0/0x1b0 [ 732.180370][ T574] ? __kasan_check_write+0x14/0x20 [ 732.185260][ T574] ? create_io_thread+0x1e0/0x1e0 [ 732.190133][ T574] ? __mutex_lock_slowpath+0x10/0x10 [ 732.195250][ T574] __x64_sys_clone+0x289/0x310 [ 732.199846][ T574] ? __do_sys_vfork+0x130/0x130 [ 732.204530][ T574] ? debug_smp_processor_id+0x17/0x20 [ 732.209736][ T574] do_syscall_64+0x44/0xd0 [ 732.214004][ T574] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 732.219735][ T574] RIP: 0033:0x7f14733430a9 [ 732.223970][ T574] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 732.243413][ T574] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 732.251655][ T574] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:05 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 20) 23:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9febf60318"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:05 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x200001a0) 23:31:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x8}, 0x20) 23:31:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01000a"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x8}, 0x20) 23:31:05 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000000)=@raw=[@generic={0x7, 0x4, 0xa, 0x2}, @ldst={0x0, 0x0, 0x1, 0x1, 0x3, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x1, 0x1, 0x2, 0x9, 0x4, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0xb3c8, 0xad, &(0x7f00000001c0)=""/173, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x5, 0x7, 0xffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0]}, 0x80) 23:31:05 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x8}, 0x20) 23:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010218"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 732.259470][ T574] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 732.267391][ T574] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 732.275177][ T574] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 732.282991][ T574] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 732.290803][ T574] [ 732.349786][ T607] FAULT_INJECTION: forcing a failure. [ 732.349786][ T607] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 732.393593][ T607] CPU: 1 PID: 607 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 732.403496][ T607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 732.413386][ T607] Call Trace: [ 732.416512][ T607] [ 732.419288][ T607] dump_stack_lvl+0x151/0x1b7 [ 732.423806][ T607] ? bfq_pos_tree_add_move+0x43e/0x43e [ 732.429270][ T607] ? arch_stack_walk+0xf8/0x140 [ 732.433957][ T607] dump_stack+0x15/0x17 [ 732.437986][ T607] should_fail+0x3c0/0x510 [ 732.442204][ T607] should_fail_alloc_page+0x58/0x70 [ 732.447235][ T607] __alloc_pages+0x1de/0x7c0 [ 732.451925][ T607] ? __count_vm_events+0x30/0x30 [ 732.456696][ T607] ? __kasan_slab_alloc+0xc4/0xe0 [ 732.461557][ T607] ? __kasan_slab_alloc+0xb2/0xe0 [ 732.466416][ T607] ? kmem_cache_alloc+0x189/0x2f0 [ 732.471281][ T607] ? vm_area_dup+0x26/0x1d0 [ 732.475615][ T607] ? dup_mmap+0x6b8/0xea0 [ 732.479794][ T607] ? dup_mm+0x91/0x330 [ 732.483691][ T607] ? copy_mm+0x108/0x1b0 [ 732.487777][ T607] ? kernel_clone+0x22d/0x990 [ 732.492369][ T607] ? __x64_sys_clone+0x289/0x310 [ 732.497143][ T607] ? do_syscall_64+0x44/0xd0 [ 732.501568][ T607] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 732.507471][ T607] allocate_slab+0x62/0x580 [ 732.511812][ T607] ___slab_alloc+0x2e2/0x6f0 [ 732.516236][ T607] ? anon_vma_clone+0xa1/0x4f0 [ 732.520837][ T607] ? anon_vma_clone+0xa1/0x4f0 [ 732.525437][ T607] __slab_alloc+0x4a/0x90 [ 732.529602][ T607] kmem_cache_alloc+0x205/0x2f0 [ 732.534295][ T607] ? anon_vma_clone+0xa1/0x4f0 [ 732.538897][ T607] anon_vma_clone+0xa1/0x4f0 [ 732.543319][ T607] anon_vma_fork+0x91/0x4f0 [ 732.547654][ T607] ? anon_vma_name+0x4c/0x70 [ 732.552082][ T607] dup_mmap+0x750/0xea0 [ 732.556074][ T607] ? __delayed_free_task+0x20/0x20 [ 732.561023][ T607] ? mm_init+0x807/0x960 [ 732.565103][ T607] dup_mm+0x91/0x330 [ 732.568834][ T607] copy_mm+0x108/0x1b0 [ 732.572746][ T607] copy_process+0x1295/0x3250 [ 732.577254][ T607] ? proc_fail_nth_write+0x213/0x290 [ 732.582460][ T607] ? proc_fail_nth_read+0x220/0x220 [ 732.587497][ T607] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 732.592440][ T607] ? vfs_write+0x9af/0x1050 [ 732.596786][ T607] ? vmacache_update+0xb7/0x120 [ 732.601468][ T607] kernel_clone+0x22d/0x990 [ 732.605808][ T607] ? file_end_write+0x1b0/0x1b0 [ 732.610493][ T607] ? __kasan_check_write+0x14/0x20 [ 732.615441][ T607] ? create_io_thread+0x1e0/0x1e0 [ 732.620310][ T607] ? __mutex_lock_slowpath+0x10/0x10 [ 732.625421][ T607] __x64_sys_clone+0x289/0x310 [ 732.630027][ T607] ? __do_sys_vfork+0x130/0x130 [ 732.634709][ T607] ? debug_smp_processor_id+0x17/0x20 [ 732.639917][ T607] do_syscall_64+0x44/0xd0 [ 732.644173][ T607] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 732.649984][ T607] RIP: 0033:0x7f14733430a9 [ 732.654237][ T607] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 732.673779][ T607] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 732.682037][ T607] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:06 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 21) 23:31:06 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000000)=@raw=[@generic={0x7, 0x4, 0xa, 0x2}, @ldst={0x0, 0x0, 0x1, 0x1, 0x3, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x1, 0x1, 0x2, 0x9, 0x4, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0xb3c8, 0xad, &(0x7f00000001c0)=""/173, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x5, 0x7, 0xffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0]}, 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000000)=@raw=[@generic={0x7, 0x4, 0xa, 0x2}, @ldst={0x0, 0x0, 0x1, 0x1, 0x3, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x1, 0x1, 0x2, 0x9, 0x4, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0xb3c8, 0xad, &(0x7f00000001c0)=""/173, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x5, 0x7, 0xffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0]}, 0x80) (async) 23:31:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010318"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010418"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 732.689934][ T607] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 732.697743][ T607] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 732.705555][ T607] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 732.713369][ T607] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 732.721184][ T607] 23:31:06 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000000)=@raw=[@generic={0x7, 0x4, 0xa, 0x2}, @ldst={0x0, 0x0, 0x1, 0x1, 0x3, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x1, 0x1, 0x2, 0x9, 0x4, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0xb3c8, 0xad, &(0x7f00000001c0)=""/173, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x5, 0x7, 0xffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0]}, 0x80) (rerun: 32) 23:31:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 732.781599][ T634] FAULT_INJECTION: forcing a failure. [ 732.781599][ T634] name failslab, interval 1, probability 0, space 0, times 0 [ 732.822469][ T634] CPU: 1 PID: 634 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 732.832378][ T634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 732.842352][ T634] Call Trace: [ 732.845476][ T634] [ 732.848252][ T634] dump_stack_lvl+0x151/0x1b7 [ 732.852772][ T634] ? bfq_pos_tree_add_move+0x43e/0x43e [ 732.858059][ T634] ? _raw_spin_lock+0xa3/0x1b0 [ 732.862661][ T634] ? dup_fd+0x51f/0xa40 [ 732.866656][ T634] dump_stack+0x15/0x17 [ 732.870644][ T634] should_fail+0x3c0/0x510 [ 732.875002][ T634] __should_failslab+0x9f/0xe0 [ 732.879585][ T634] should_failslab+0x9/0x20 [ 732.883921][ T634] kmem_cache_alloc+0x4f/0x2f0 [ 732.888521][ T634] ? copy_fs_struct+0x4e/0x230 [ 732.893121][ T634] copy_fs_struct+0x4e/0x230 [ 732.897549][ T634] copy_fs+0x72/0x140 [ 732.901374][ T634] copy_process+0x1214/0x3250 [ 732.905881][ T634] ? proc_fail_nth_write+0x213/0x290 [ 732.911000][ T634] ? proc_fail_nth_read+0x220/0x220 [ 732.916035][ T634] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 732.920981][ T634] ? vfs_write+0x9af/0x1050 [ 732.925321][ T634] ? vmacache_update+0xb7/0x120 [ 732.930008][ T634] kernel_clone+0x22d/0x990 [ 732.934348][ T634] ? file_end_write+0x1b0/0x1b0 [ 732.939039][ T634] ? __kasan_check_write+0x14/0x20 [ 732.943988][ T634] ? create_io_thread+0x1e0/0x1e0 [ 732.948876][ T634] ? __mutex_lock_slowpath+0x10/0x10 [ 732.953971][ T634] __x64_sys_clone+0x289/0x310 [ 732.958567][ T634] ? __do_sys_vfork+0x130/0x130 [ 732.963251][ T634] ? debug_smp_processor_id+0x17/0x20 [ 732.968466][ T634] do_syscall_64+0x44/0xd0 [ 732.972715][ T634] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 732.978441][ T634] RIP: 0033:0x7f14733430a9 [ 732.982695][ T634] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 733.002222][ T634] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 733.010466][ T634] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:06 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 22) 23:31:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000003c0)="21cb689b5ef62efba764fee75d297ab9a236543a8348a8fdcbb4755d469f26c20acf1d3e450cbe069197fff02cbc089a6da587a9bb3ae5f785affc3722dbd2896a95bf5edd2c2222e8dbf30ce247cd22c6adbd", &(0x7f0000000280), &(0x7f0000000440)="d1d5727b3a0f4b1a5f1dc1b38e04472c723d0b8e23ed3f724ba67da789a605ba93cb4c4d29335cc0a80dbc6073221ff42f64d448a2009c19cdedc72e02a983fa77268d7c70656f6c9337d1", &(0x7f00000004c0)="b6a26c416ccc67bc739a2651f6e355f52e142eae72d54875a3de7e96616a456c5f1ba6bba2d2f3d94572", 0x7, r0, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1a, 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="fce52000080000001800000002000000000000000a0b0000182a0000", @ANYRES32=r0, @ANYBLOB="0000000006000000c696878ddb1694c245dd00000000000000000000000000003aa2318ce251933c01d4b2932e29c24b6e1eecabb02ed60e7d4789fc9442ee84846b6afafa429c3c79a3ef283eaddf"], &(0x7f0000000a00)='GPL\x00', 0xbab4, 0x4a, &(0x7f00000002c0)=""/74, 0x40f00, 0x2, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000340)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1, 0x2, 0x1}, 0x10, 0x0, r4}, 0x80) 23:31:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010518"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x5c, 0x0, 0x8}, 0x20) [ 733.018279][ T634] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 733.026089][ T634] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.033906][ T634] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 733.041799][ T634] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 733.049612][ T634] 23:31:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010618"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000003c0)="21cb689b5ef62efba764fee75d297ab9a236543a8348a8fdcbb4755d469f26c20acf1d3e450cbe069197fff02cbc089a6da587a9bb3ae5f785affc3722dbd2896a95bf5edd2c2222e8dbf30ce247cd22c6adbd", &(0x7f0000000280), &(0x7f0000000440)="d1d5727b3a0f4b1a5f1dc1b38e04472c723d0b8e23ed3f724ba67da789a605ba93cb4c4d29335cc0a80dbc6073221ff42f64d448a2009c19cdedc72e02a983fa77268d7c70656f6c9337d1", &(0x7f00000004c0)="b6a26c416ccc67bc739a2651f6e355f52e142eae72d54875a3de7e96616a456c5f1ba6bba2d2f3d94572", 0x7, r0, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1a, 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="fce52000080000001800000002000000000000000a0b0000182a0000", @ANYRES32=r0, @ANYBLOB="0000000006000000c696878ddb1694c245dd00000000000000000000000000003aa2318ce251933c01d4b2932e29c24b6e1eecabb02ed60e7d4789fc9442ee84846b6afafa429c3c79a3ef283eaddf"], &(0x7f0000000a00)='GPL\x00', 0xbab4, 0x4a, &(0x7f00000002c0)=""/74, 0x40f00, 0x2, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000340)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1, 0x2, 0x1}, 0x10, 0x0, r4}, 0x80) 23:31:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x5c, 0x0, 0x8}, 0x20) [ 733.071127][ T655] FAULT_INJECTION: forcing a failure. [ 733.071127][ T655] name failslab, interval 1, probability 0, space 0, times 0 [ 733.089251][ T655] CPU: 1 PID: 655 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 733.099149][ T655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 733.109044][ T655] Call Trace: [ 733.112172][ T655] [ 733.114946][ T655] dump_stack_lvl+0x151/0x1b7 [ 733.119459][ T655] ? bfq_pos_tree_add_move+0x43e/0x43e [ 733.124753][ T655] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 733.131002][ T655] dump_stack+0x15/0x17 [ 733.134994][ T655] should_fail+0x3c0/0x510 [ 733.139247][ T655] __should_failslab+0x9f/0xe0 [ 733.143845][ T655] should_failslab+0x9/0x20 [ 733.148206][ T655] kmem_cache_alloc+0x4f/0x2f0 [ 733.152795][ T655] ? anon_vma_fork+0xf7/0x4f0 [ 733.157300][ T655] anon_vma_fork+0xf7/0x4f0 [ 733.161640][ T655] ? anon_vma_name+0x4c/0x70 [ 733.166062][ T655] dup_mmap+0x750/0xea0 [ 733.170056][ T655] ? __delayed_free_task+0x20/0x20 [ 733.175006][ T655] ? mm_init+0x807/0x960 [ 733.179080][ T655] dup_mm+0x91/0x330 [ 733.182812][ T655] copy_mm+0x108/0x1b0 [ 733.186721][ T655] copy_process+0x1295/0x3250 [ 733.191235][ T655] ? proc_fail_nth_write+0x213/0x290 [ 733.196354][ T655] ? proc_fail_nth_read+0x220/0x220 [ 733.201389][ T655] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 733.206336][ T655] ? vfs_write+0x9af/0x1050 [ 733.210675][ T655] ? vmacache_update+0xb7/0x120 [ 733.215362][ T655] kernel_clone+0x22d/0x990 [ 733.219705][ T655] ? file_end_write+0x1b0/0x1b0 [ 733.224389][ T655] ? __kasan_check_write+0x14/0x20 [ 733.229335][ T655] ? create_io_thread+0x1e0/0x1e0 [ 733.234195][ T655] ? __mutex_lock_slowpath+0x10/0x10 [ 733.239316][ T655] __x64_sys_clone+0x289/0x310 [ 733.243978][ T655] ? __do_sys_vfork+0x130/0x130 [ 733.248606][ T655] ? debug_smp_processor_id+0x17/0x20 [ 733.253811][ T655] do_syscall_64+0x44/0xd0 [ 733.258062][ T655] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 733.263794][ T655] RIP: 0033:0x7f14733430a9 [ 733.268045][ T655] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 733.287573][ T655] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 733.295820][ T655] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 733.303629][ T655] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 733.311440][ T655] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010718"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000003c0)="21cb689b5ef62efba764fee75d297ab9a236543a8348a8fdcbb4755d469f26c20acf1d3e450cbe069197fff02cbc089a6da587a9bb3ae5f785affc3722dbd2896a95bf5edd2c2222e8dbf30ce247cd22c6adbd", &(0x7f0000000280), &(0x7f0000000440)="d1d5727b3a0f4b1a5f1dc1b38e04472c723d0b8e23ed3f724ba67da789a605ba93cb4c4d29335cc0a80dbc6073221ff42f64d448a2009c19cdedc72e02a983fa77268d7c70656f6c9337d1", &(0x7f00000004c0)="b6a26c416ccc67bc739a2651f6e355f52e142eae72d54875a3de7e96616a456c5f1ba6bba2d2f3d94572", 0x7, r0, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1a, 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="fce52000080000001800000002000000000000000a0b0000182a0000", @ANYRES32=r0, @ANYBLOB="0000000006000000c696878ddb1694c245dd00000000000000000000000000003aa2318ce251933c01d4b2932e29c24b6e1eecabb02ed60e7d4789fc9442ee84846b6afafa429c3c79a3ef283eaddf"], &(0x7f0000000a00)='GPL\x00', 0xbab4, 0x4a, &(0x7f00000002c0)=""/74, 0x40f00, 0x2, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000340)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1, 0x2, 0x1}, 0x10, 0x0, r4}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000003c0)="21cb689b5ef62efba764fee75d297ab9a236543a8348a8fdcbb4755d469f26c20acf1d3e450cbe069197fff02cbc089a6da587a9bb3ae5f785affc3722dbd2896a95bf5edd2c2222e8dbf30ce247cd22c6adbd", &(0x7f0000000280), &(0x7f0000000440)="d1d5727b3a0f4b1a5f1dc1b38e04472c723d0b8e23ed3f724ba67da789a605ba93cb4c4d29335cc0a80dbc6073221ff42f64d448a2009c19cdedc72e02a983fa77268d7c70656f6c9337d1", &(0x7f00000004c0)="b6a26c416ccc67bc739a2651f6e355f52e142eae72d54875a3de7e96616a456c5f1ba6bba2d2f3d94572", 0x7, r0, 0x4}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1a, 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="fce52000080000001800000002000000000000000a0b0000182a0000", @ANYRES32=r0, @ANYBLOB="0000000006000000c696878ddb1694c245dd00000000000000000000000000003aa2318ce251933c01d4b2932e29c24b6e1eecabb02ed60e7d4789fc9442ee84846b6afafa429c3c79a3ef283eaddf"], &(0x7f0000000a00)='GPL\x00', 0xbab4, 0x4a, &(0x7f00000002c0)=""/74, 0x40f00, 0x2, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000340)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1, 0x2, 0x1}, 0x10, 0x0, r4}, 0x80) (async) 23:31:06 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 23) 23:31:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x5c, 0x0, 0x8}, 0x20) 23:31:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010818"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 733.319250][ T655] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 733.327068][ T655] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 733.335138][ T655] [ 733.397331][ T687] FAULT_INJECTION: forcing a failure. [ 733.397331][ T687] name failslab, interval 1, probability 0, space 0, times 0 [ 733.420389][ T687] CPU: 0 PID: 687 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 733.430293][ T687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 733.440183][ T687] Call Trace: [ 733.443303][ T687] [ 733.446083][ T687] dump_stack_lvl+0x151/0x1b7 [ 733.450601][ T687] ? bfq_pos_tree_add_move+0x43e/0x43e [ 733.455890][ T687] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 733.462142][ T687] dump_stack+0x15/0x17 [ 733.466131][ T687] should_fail+0x3c0/0x510 [ 733.470386][ T687] __should_failslab+0x9f/0xe0 [ 733.474986][ T687] should_failslab+0x9/0x20 [ 733.479327][ T687] kmem_cache_alloc+0x4f/0x2f0 [ 733.483928][ T687] ? anon_vma_fork+0xf7/0x4f0 [ 733.488438][ T687] anon_vma_fork+0xf7/0x4f0 [ 733.492780][ T687] ? anon_vma_name+0x4c/0x70 [ 733.497204][ T687] dup_mmap+0x750/0xea0 [ 733.501204][ T687] ? __delayed_free_task+0x20/0x20 [ 733.506154][ T687] ? mm_init+0x807/0x960 [ 733.510223][ T687] dup_mm+0x91/0x330 [ 733.514002][ T687] copy_mm+0x108/0x1b0 [ 733.517860][ T687] copy_process+0x1295/0x3250 [ 733.522373][ T687] ? proc_fail_nth_write+0x213/0x290 [ 733.527495][ T687] ? proc_fail_nth_read+0x220/0x220 [ 733.532617][ T687] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 733.537569][ T687] ? vfs_write+0x9af/0x1050 [ 733.542339][ T687] ? vmacache_update+0xb7/0x120 [ 733.547026][ T687] kernel_clone+0x22d/0x990 [ 733.551364][ T687] ? file_end_write+0x1b0/0x1b0 [ 733.556052][ T687] ? __kasan_check_write+0x14/0x20 [ 733.560997][ T687] ? create_io_thread+0x1e0/0x1e0 [ 733.565859][ T687] ? __mutex_lock_slowpath+0x10/0x10 [ 733.570993][ T687] __x64_sys_clone+0x289/0x310 [ 733.575624][ T687] ? __do_sys_vfork+0x130/0x130 [ 733.580267][ T687] ? debug_smp_processor_id+0x17/0x20 [ 733.585476][ T687] do_syscall_64+0x44/0xd0 [ 733.589728][ T687] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 733.595455][ T687] RIP: 0033:0x7f14733430a9 [ 733.599709][ T687] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 733.619148][ T687] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 733.627393][ T687] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 733.635205][ T687] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010918"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:31:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:07 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, r0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x3, 0x0, 0x2, 0x5, 0x80, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xff}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}]}, &(0x7f0000000400)='syzkaller\x00', 0x6ff, 0x2a, &(0x7f0000000440)=""/42, 0x41000, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x3, 0x7, 0x2}, 0x10, r0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) 23:31:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:31:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:07 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 24) 23:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010a18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 733.643017][ T687] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.650828][ T687] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 733.658648][ T687] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 733.666540][ T687] 23:31:07 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, r0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x3, 0x0, 0x2, 0x5, 0x80, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xff}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}]}, &(0x7f0000000400)='syzkaller\x00', 0x6ff, 0x2a, &(0x7f0000000440)=""/42, 0x41000, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x3, 0x7, 0x2}, 0x10, r0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) 23:31:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:31:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010b18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000, 0x0, 0x1}, 0x20) 23:31:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000, 0x0, 0x1}, 0x20) 23:31:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000, 0x0, 0x1}, 0x20) [ 733.720577][ T710] FAULT_INJECTION: forcing a failure. [ 733.720577][ T710] name failslab, interval 1, probability 0, space 0, times 0 [ 733.742753][ T710] CPU: 1 PID: 710 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 733.752666][ T710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 733.762551][ T710] Call Trace: [ 733.765674][ T710] 23:31:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d}, 0x20) 23:31:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d}, 0x20) [ 733.768455][ T710] dump_stack_lvl+0x151/0x1b7 [ 733.772969][ T710] ? bfq_pos_tree_add_move+0x43e/0x43e [ 733.778271][ T710] dump_stack+0x15/0x17 [ 733.782251][ T710] should_fail+0x3c0/0x510 [ 733.786503][ T710] __should_failslab+0x9f/0xe0 [ 733.791107][ T710] should_failslab+0x9/0x20 [ 733.795447][ T710] kmem_cache_alloc+0x4f/0x2f0 [ 733.800039][ T710] ? copy_sighand+0x54/0x250 [ 733.804463][ T710] ? _raw_spin_unlock+0x4d/0x70 [ 733.809164][ T710] copy_sighand+0x54/0x250 [ 733.813405][ T710] copy_process+0x123f/0x3250 [ 733.818045][ T710] ? proc_fail_nth_write+0x213/0x290 [ 733.823167][ T710] ? proc_fail_nth_read+0x220/0x220 [ 733.828458][ T710] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 733.833404][ T710] ? vfs_write+0x9af/0x1050 [ 733.837756][ T710] ? vmacache_update+0xb7/0x120 [ 733.842430][ T710] kernel_clone+0x22d/0x990 [ 733.846771][ T710] ? file_end_write+0x1b0/0x1b0 [ 733.851456][ T710] ? __kasan_check_write+0x14/0x20 [ 733.856405][ T710] ? create_io_thread+0x1e0/0x1e0 [ 733.861264][ T710] ? __mutex_lock_slowpath+0x10/0x10 [ 733.866385][ T710] __x64_sys_clone+0x289/0x310 [ 733.870985][ T710] ? __do_sys_vfork+0x130/0x130 [ 733.875673][ T710] ? debug_smp_processor_id+0x17/0x20 [ 733.880912][ T710] do_syscall_64+0x44/0xd0 [ 733.885133][ T710] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 733.890861][ T710] RIP: 0033:0x7f14733430a9 [ 733.895117][ T710] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:31:07 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 25) 23:31:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d}, 0x20) 23:31:07 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, r0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x3, 0x0, 0x2, 0x5, 0x80, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xff}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}]}, &(0x7f0000000400)='syzkaller\x00', 0x6ff, 0x2a, &(0x7f0000000440)=""/42, 0x41000, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x3, 0x7, 0x2}, 0x10, r0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) 23:31:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010c18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:07 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, r0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x3, 0x0, 0x2, 0x5, 0x80, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xff}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}]}, &(0x7f0000000400)='syzkaller\x00', 0x6ff, 0x2a, &(0x7f0000000440)=""/42, 0x41000, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x3, 0x7, 0x2}, 0x10, r0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) 23:31:07 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, r0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x3, 0x0, 0x2, 0x5, 0x80, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xff}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}]}, &(0x7f0000000400)='syzkaller\x00', 0x6ff, 0x2a, &(0x7f0000000440)=""/42, 0x41000, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x3, 0x7, 0x2}, 0x10, r0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) 23:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010d18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 733.914557][ T710] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 733.922801][ T710] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 733.930612][ T710] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 733.938423][ T710] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.946234][ T710] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 733.954045][ T710] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 733.961861][ T710] 23:31:07 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000003c0)="21cb689b5ef62efba764fee75d297ab9a236543a8348a8fdcbb4755d469f26c20acf1d3e450cbe069197fff02cbc089a6da587a9bb3ae5f785affc3722dbd2896a95bf5edd2c2222e8dbf30ce247cd22c6adbd", &(0x7f0000000280), &(0x7f0000000440)="d1d5727b3a0f4b1a5f1dc1b38e04472c723d0b8e23ed3f724ba67da789a605ba93cb4c4d29335cc0a80dbc6073221ff42f64d448a2009c19cdedc72e02a983fa77268d7c70656f6c9337d1", &(0x7f00000004c0)="b6a26c416ccc67bc739a2651f6e355f52e142eae72d54875a3de7e96616a456c5f1ba6bba2d2f3d94572", 0x7, r0, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1a, 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="fce52000080000001800000002000000000000000a0b0000182a0000", @ANYRES32=r0, @ANYBLOB="0000000006000000c696878ddb1694c245dd00000000000000000000000000003aa2318ce251933c01d4b2932e29c24b6e1eecabb02ed60e7d4789fc9442ee84846b6afafa429c3c79a3ef283eaddf"], &(0x7f0000000a00)='GPL\x00', 0xbab4, 0x4a, &(0x7f00000002c0)=""/74, 0x40f00, 0x2, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000340)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1, 0x2, 0x1}, 0x10, 0x0, r4}, 0x80) 23:31:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:07 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, r0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x3, 0x0, 0x2, 0x5, 0x80, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xff}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}]}, &(0x7f0000000400)='syzkaller\x00', 0x6ff, 0x2a, &(0x7f0000000440)=""/42, 0x41000, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x3, 0x7, 0x2}, 0x10, r0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) [ 734.017044][ T745] FAULT_INJECTION: forcing a failure. [ 734.017044][ T745] name failslab, interval 1, probability 0, space 0, times 0 [ 734.044254][ T745] CPU: 1 PID: 745 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 734.054155][ T745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 734.064047][ T745] Call Trace: [ 734.067170][ T745] [ 734.069945][ T745] dump_stack_lvl+0x151/0x1b7 [ 734.074459][ T745] ? bfq_pos_tree_add_move+0x43e/0x43e [ 734.079754][ T745] dump_stack+0x15/0x17 [ 734.083744][ T745] should_fail+0x3c0/0x510 [ 734.088005][ T745] __should_failslab+0x9f/0xe0 [ 734.092598][ T745] should_failslab+0x9/0x20 [ 734.096946][ T745] kmem_cache_alloc+0x4f/0x2f0 [ 734.101539][ T745] ? copy_signal+0x55/0x610 [ 734.105884][ T745] copy_signal+0x55/0x610 [ 734.110044][ T745] copy_process+0x126a/0x3250 [ 734.114558][ T745] ? proc_fail_nth_write+0x213/0x290 [ 734.119677][ T745] ? proc_fail_nth_read+0x220/0x220 [ 734.124714][ T745] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 734.129659][ T745] ? vfs_write+0x9af/0x1050 [ 734.133997][ T745] ? vmacache_update+0xb7/0x120 [ 734.138685][ T745] kernel_clone+0x22d/0x990 [ 734.143026][ T745] ? file_end_write+0x1b0/0x1b0 [ 734.147713][ T745] ? __kasan_check_write+0x14/0x20 [ 734.152662][ T745] ? create_io_thread+0x1e0/0x1e0 [ 734.157522][ T745] ? __mutex_lock_slowpath+0x10/0x10 [ 734.162641][ T745] __x64_sys_clone+0x289/0x310 [ 734.167244][ T745] ? __do_sys_vfork+0x130/0x130 [ 734.172015][ T745] ? debug_smp_processor_id+0x17/0x20 [ 734.177223][ T745] do_syscall_64+0x44/0xd0 [ 734.181473][ T745] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 734.187202][ T745] RIP: 0033:0x7f14733430a9 [ 734.191456][ T745] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:31:07 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 26) 23:31:07 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000003c0)="21cb689b5ef62efba764fee75d297ab9a236543a8348a8fdcbb4755d469f26c20acf1d3e450cbe069197fff02cbc089a6da587a9bb3ae5f785affc3722dbd2896a95bf5edd2c2222e8dbf30ce247cd22c6adbd", &(0x7f0000000280), &(0x7f0000000440)="d1d5727b3a0f4b1a5f1dc1b38e04472c723d0b8e23ed3f724ba67da789a605ba93cb4c4d29335cc0a80dbc6073221ff42f64d448a2009c19cdedc72e02a983fa77268d7c70656f6c9337d1", &(0x7f00000004c0)="b6a26c416ccc67bc739a2651f6e355f52e142eae72d54875a3de7e96616a456c5f1ba6bba2d2f3d94572", 0x7, r0, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1a, 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="fce52000080000001800000002000000000000000a0b0000182a0000", @ANYRES32=r0, @ANYBLOB="0000000006000000c696878ddb1694c245dd00000000000000000000000000003aa2318ce251933c01d4b2932e29c24b6e1eecabb02ed60e7d4789fc9442ee84846b6afafa429c3c79a3ef283eaddf"], &(0x7f0000000a00)='GPL\x00', 0xbab4, 0x4a, &(0x7f00000002c0)=""/74, 0x40f00, 0x2, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000340)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1, 0x2, 0x1}, 0x10, 0x0, r4}, 0x80) 23:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010e18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:07 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, r0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:07 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000003c0)="21cb689b5ef62efba764fee75d297ab9a236543a8348a8fdcbb4755d469f26c20acf1d3e450cbe069197fff02cbc089a6da587a9bb3ae5f785affc3722dbd2896a95bf5edd2c2222e8dbf30ce247cd22c6adbd", &(0x7f0000000280), &(0x7f0000000440)="d1d5727b3a0f4b1a5f1dc1b38e04472c723d0b8e23ed3f724ba67da789a605ba93cb4c4d29335cc0a80dbc6073221ff42f64d448a2009c19cdedc72e02a983fa77268d7c70656f6c9337d1", &(0x7f00000004c0)="b6a26c416ccc67bc739a2651f6e355f52e142eae72d54875a3de7e96616a456c5f1ba6bba2d2f3d94572", 0x7, r0, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1a, 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="fce52000080000001800000002000000000000000a0b0000182a0000", @ANYRES32=r0, @ANYBLOB="0000000006000000c696878ddb1694c245dd00000000000000000000000000003aa2318ce251933c01d4b2932e29c24b6e1eecabb02ed60e7d4789fc9442ee84846b6afafa429c3c79a3ef283eaddf"], &(0x7f0000000a00)='GPL\x00', 0xbab4, 0x4a, &(0x7f00000002c0)=""/74, 0x40f00, 0x2, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000340)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1, 0x2, 0x1}, 0x10, 0x0, r4}, 0x80) 23:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb011018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 734.210898][ T745] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 734.219142][ T745] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 734.226953][ T745] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 734.234767][ T745] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 734.242577][ T745] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 734.250387][ T745] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 734.258219][ T745] 23:31:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:07 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, r0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb011118"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 734.308650][ T768] FAULT_INJECTION: forcing a failure. [ 734.308650][ T768] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 734.334907][ T768] CPU: 1 PID: 768 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 734.344817][ T768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 734.354713][ T768] Call Trace: [ 734.357833][ T768] [ 734.360608][ T768] dump_stack_lvl+0x151/0x1b7 [ 734.365125][ T768] ? bfq_pos_tree_add_move+0x43e/0x43e [ 734.370427][ T768] ? __kasan_check_write+0x14/0x20 [ 734.375360][ T768] ? __set_page_owner+0x2ee/0x310 [ 734.380224][ T768] dump_stack+0x15/0x17 [ 734.384214][ T768] should_fail+0x3c0/0x510 [ 734.388468][ T768] should_fail_alloc_page+0x58/0x70 [ 734.393501][ T768] __alloc_pages+0x1de/0x7c0 [ 734.397928][ T768] ? __count_vm_events+0x30/0x30 [ 734.402703][ T768] ? __count_vm_events+0x30/0x30 [ 734.407474][ T768] ? __kasan_check_write+0x14/0x20 [ 734.412421][ T768] ? _raw_spin_lock+0xa3/0x1b0 [ 734.417031][ T768] __pmd_alloc+0xb1/0x550 [ 734.421190][ T768] ? kmem_cache_alloc+0x189/0x2f0 [ 734.426049][ T768] ? anon_vma_fork+0x1b9/0x4f0 [ 734.430649][ T768] ? __pud_alloc+0x260/0x260 [ 734.435075][ T768] ? __pud_alloc+0x218/0x260 [ 734.439592][ T768] ? do_handle_mm_fault+0x2370/0x2370 [ 734.444971][ T768] copy_page_range+0xd04/0x1090 [ 734.449662][ T768] ? pfn_valid+0x1e0/0x1e0 [ 734.453910][ T768] dup_mmap+0x99f/0xea0 [ 734.457912][ T768] ? __delayed_free_task+0x20/0x20 [ 734.463117][ T768] ? mm_init+0x807/0x960 [ 734.467200][ T768] dup_mm+0x91/0x330 [ 734.470929][ T768] copy_mm+0x108/0x1b0 [ 734.474837][ T768] copy_process+0x1295/0x3250 [ 734.479348][ T768] ? proc_fail_nth_write+0x213/0x290 [ 734.484509][ T768] ? proc_fail_nth_read+0x220/0x220 [ 734.489512][ T768] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 734.494449][ T768] ? vfs_write+0x9af/0x1050 [ 734.498795][ T768] ? vmacache_update+0xb7/0x120 [ 734.503477][ T768] kernel_clone+0x22d/0x990 [ 734.507819][ T768] ? file_end_write+0x1b0/0x1b0 [ 734.512503][ T768] ? __kasan_check_write+0x14/0x20 [ 734.517450][ T768] ? create_io_thread+0x1e0/0x1e0 [ 734.522312][ T768] ? __mutex_lock_slowpath+0x10/0x10 [ 734.527432][ T768] __x64_sys_clone+0x289/0x310 [ 734.532035][ T768] ? __do_sys_vfork+0x130/0x130 [ 734.536722][ T768] ? debug_smp_processor_id+0x17/0x20 [ 734.541927][ T768] do_syscall_64+0x44/0xd0 [ 734.546179][ T768] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 734.551909][ T768] RIP: 0033:0x7f14733430a9 [ 734.556161][ T768] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 734.575603][ T768] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 734.583847][ T768] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 734.591660][ T768] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 734.599470][ T768] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:08 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 27) 23:31:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb011218"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000003c0)="21cb689b5ef62efba764fee75d297ab9a236543a8348a8fdcbb4755d469f26c20acf1d3e450cbe069197fff02cbc089a6da587a9bb3ae5f785affc3722dbd2896a95bf5edd2c2222e8dbf30ce247cd22c6adbd", &(0x7f0000000280), &(0x7f0000000440)="d1d5727b3a0f4b1a5f1dc1b38e04472c723d0b8e23ed3f724ba67da789a605ba93cb4c4d29335cc0a80dbc6073221ff42f64d448a2009c19cdedc72e02a983fa77268d7c70656f6c9337d1", &(0x7f00000004c0)="b6a26c416ccc67bc739a2651f6e355f52e142eae72d54875a3de7e96616a456c5f1ba6bba2d2f3d94572", 0x7, r0, 0x4}, 0x38) 23:31:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000000)) 23:31:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000000)) 23:31:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) [ 734.607281][ T768] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 734.615094][ T768] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 734.622906][ T768] 23:31:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:08 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:31:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000000)) [ 734.658536][ T788] FAULT_INJECTION: forcing a failure. [ 734.658536][ T788] name failslab, interval 1, probability 0, space 0, times 0 [ 734.694070][ T788] CPU: 1 PID: 788 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 734.703977][ T788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 734.713867][ T788] Call Trace: [ 734.716986][ T788] [ 734.719769][ T788] dump_stack_lvl+0x151/0x1b7 [ 734.724277][ T788] ? bfq_pos_tree_add_move+0x43e/0x43e [ 734.729570][ T788] dump_stack+0x15/0x17 [ 734.733565][ T788] should_fail+0x3c0/0x510 [ 734.737817][ T788] __should_failslab+0x9f/0xe0 [ 734.742416][ T788] should_failslab+0x9/0x20 [ 734.746755][ T788] kmem_cache_alloc+0x4f/0x2f0 [ 734.751353][ T788] ? vm_area_dup+0x26/0x1d0 [ 734.755696][ T788] vm_area_dup+0x26/0x1d0 [ 734.759871][ T788] dup_mmap+0x6b8/0xea0 [ 734.763862][ T788] ? __delayed_free_task+0x20/0x20 [ 734.768801][ T788] ? mm_init+0x807/0x960 [ 734.772880][ T788] dup_mm+0x91/0x330 [ 734.776616][ T788] copy_mm+0x108/0x1b0 [ 734.780519][ T788] copy_process+0x1295/0x3250 [ 734.785032][ T788] ? proc_fail_nth_write+0x213/0x290 [ 734.790238][ T788] ? proc_fail_nth_read+0x220/0x220 [ 734.795273][ T788] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 734.800219][ T788] ? vfs_write+0x9af/0x1050 [ 734.804559][ T788] ? vmacache_update+0xb7/0x120 [ 734.809343][ T788] kernel_clone+0x22d/0x990 [ 734.813678][ T788] ? file_end_write+0x1b0/0x1b0 [ 734.818359][ T788] ? __kasan_check_write+0x14/0x20 [ 734.823307][ T788] ? create_io_thread+0x1e0/0x1e0 [ 734.828170][ T788] ? __mutex_lock_slowpath+0x10/0x10 [ 734.833289][ T788] __x64_sys_clone+0x289/0x310 [ 734.837888][ T788] ? __do_sys_vfork+0x130/0x130 [ 734.842577][ T788] ? debug_smp_processor_id+0x17/0x20 [ 734.847783][ T788] do_syscall_64+0x44/0xd0 [ 734.852037][ T788] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 734.857769][ T788] RIP: 0033:0x7f14733430a9 [ 734.862022][ T788] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 734.881460][ T788] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 734.889706][ T788] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 734.897516][ T788] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:08 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 28) 23:31:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb011818"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:08 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:31:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/149, 0x5c, 0x95, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd9, 0xd9, 0xa, [@volatile={0x2}, @datasec={0xd, 0x4, 0x0, 0xf, 0x1, [{0x8, 0x27, 0x9}, {0x2, 0x1ff, 0x75d3ee7b}, {0x3, 0x6, 0x4e0e}, {0x2, 0x7fff, 0x3}], "cf"}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @fwd={0xc}, @const={0x40, 0x0, 0x0, 0xa, 0x2}, @typedef={0x0, 0x0, 0x0, 0x8, 0x3}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x2, 0x5}, {0x5, 0x1}, {0xd, 0x2}, {0x7, 0x5}, {0x6, 0x5}, {0x5, 0x4}, {0x9, 0x3}, {0x9, 0x4}, {0x9, 0x2}]}, @restrict={0x9, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x30, 0x5f, 0x6f, 0x2e, 0x2e, 0x5f, 0x61, 0x2e]}}, &(0x7f00000000c0)=""/174, 0xfe, 0xae, 0x1}, 0x20) 23:31:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) 23:31:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb012518"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:08 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:31:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) [ 734.905327][ T788] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 734.913139][ T788] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 734.920951][ T788] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 734.928763][ T788] 23:31:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb014418"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/149, 0x5c, 0x95, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd9, 0xd9, 0xa, [@volatile={0x2}, @datasec={0xd, 0x4, 0x0, 0xf, 0x1, [{0x8, 0x27, 0x9}, {0x2, 0x1ff, 0x75d3ee7b}, {0x3, 0x6, 0x4e0e}, {0x2, 0x7fff, 0x3}], "cf"}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @fwd={0xc}, @const={0x40, 0x0, 0x0, 0xa, 0x2}, @typedef={0x0, 0x0, 0x0, 0x8, 0x3}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x2, 0x5}, {0x5, 0x1}, {0xd, 0x2}, {0x7, 0x5}, {0x6, 0x5}, {0x5, 0x4}, {0x9, 0x3}, {0x9, 0x4}, {0x9, 0x2}]}, @restrict={0x9, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x30, 0x5f, 0x6f, 0x2e, 0x2e, 0x5f, 0x61, 0x2e]}}, &(0x7f00000000c0)=""/174, 0xfe, 0xae, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/149, 0x5c, 0x95, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd9, 0xd9, 0xa, [@volatile={0x2}, @datasec={0xd, 0x4, 0x0, 0xf, 0x1, [{0x8, 0x27, 0x9}, {0x2, 0x1ff, 0x75d3ee7b}, {0x3, 0x6, 0x4e0e}, {0x2, 0x7fff, 0x3}], "cf"}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @fwd={0xc}, @const={0x40, 0x0, 0x0, 0xa, 0x2}, @typedef={0x0, 0x0, 0x0, 0x8, 0x3}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x2, 0x5}, {0x5, 0x1}, {0xd, 0x2}, {0x7, 0x5}, {0x6, 0x5}, {0x5, 0x4}, {0x9, 0x3}, {0x9, 0x4}, {0x9, 0x2}]}, @restrict={0x9, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x30, 0x5f, 0x6f, 0x2e, 0x2e, 0x5f, 0x61, 0x2e]}}, &(0x7f00000000c0)=""/174, 0xfe, 0xae, 0x1}, 0x20) (async) [ 734.972242][ T820] FAULT_INJECTION: forcing a failure. [ 734.972242][ T820] name failslab, interval 1, probability 0, space 0, times 0 [ 734.988370][ T820] CPU: 1 PID: 820 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 734.998269][ T820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 735.008165][ T820] Call Trace: [ 735.011290][ T820] [ 735.014064][ T820] dump_stack_lvl+0x151/0x1b7 [ 735.018579][ T820] ? bfq_pos_tree_add_move+0x43e/0x43e [ 735.023874][ T820] dump_stack+0x15/0x17 [ 735.027863][ T820] should_fail+0x3c0/0x510 [ 735.032121][ T820] __should_failslab+0x9f/0xe0 [ 735.036720][ T820] should_failslab+0x9/0x20 [ 735.041057][ T820] kmem_cache_alloc+0x4f/0x2f0 [ 735.045658][ T820] ? vm_area_dup+0x26/0x1d0 [ 735.049998][ T820] ? __kasan_check_read+0x11/0x20 [ 735.054856][ T820] vm_area_dup+0x26/0x1d0 [ 735.059024][ T820] dup_mmap+0x6b8/0xea0 [ 735.063014][ T820] ? __delayed_free_task+0x20/0x20 [ 735.067958][ T820] ? mm_init+0x807/0x960 [ 735.072045][ T820] dup_mm+0x91/0x330 [ 735.075770][ T820] copy_mm+0x108/0x1b0 [ 735.079676][ T820] copy_process+0x1295/0x3250 [ 735.084189][ T820] ? proc_fail_nth_write+0x213/0x290 [ 735.089312][ T820] ? proc_fail_nth_read+0x220/0x220 [ 735.094346][ T820] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 735.099293][ T820] ? vfs_write+0x9af/0x1050 [ 735.103632][ T820] ? vmacache_update+0xb7/0x120 [ 735.108321][ T820] kernel_clone+0x22d/0x990 [ 735.112657][ T820] ? file_end_write+0x1b0/0x1b0 [ 735.117346][ T820] ? __kasan_check_write+0x14/0x20 [ 735.122292][ T820] ? create_io_thread+0x1e0/0x1e0 [ 735.127153][ T820] ? __mutex_lock_slowpath+0x10/0x10 [ 735.132278][ T820] __x64_sys_clone+0x289/0x310 [ 735.136874][ T820] ? __do_sys_vfork+0x130/0x130 [ 735.141560][ T820] ? debug_smp_processor_id+0x17/0x20 [ 735.146807][ T820] do_syscall_64+0x44/0xd0 [ 735.151021][ T820] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 735.156749][ T820] RIP: 0033:0x7f14733430a9 [ 735.161004][ T820] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 735.180441][ T820] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 735.188687][ T820] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 735.196500][ T820] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 735.204309][ T820] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 735.212122][ T820] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:08 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 29) 23:31:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) 23:31:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb014818"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/149, 0x5c, 0x95, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd9, 0xd9, 0xa, [@volatile={0x2}, @datasec={0xd, 0x4, 0x0, 0xf, 0x1, [{0x8, 0x27, 0x9}, {0x2, 0x1ff, 0x75d3ee7b}, {0x3, 0x6, 0x4e0e}, {0x2, 0x7fff, 0x3}], "cf"}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @fwd={0xc}, @const={0x40, 0x0, 0x0, 0xa, 0x2}, @typedef={0x0, 0x0, 0x0, 0x8, 0x3}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x2, 0x5}, {0x5, 0x1}, {0xd, 0x2}, {0x7, 0x5}, {0x6, 0x5}, {0x5, 0x4}, {0x9, 0x3}, {0x9, 0x4}, {0x9, 0x2}]}, @restrict={0x9, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x30, 0x5f, 0x6f, 0x2e, 0x2e, 0x5f, 0x61, 0x2e]}}, &(0x7f00000000c0)=""/174, 0xfe, 0xae, 0x1}, 0x20) 23:31:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) 23:31:08 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x89, 0x8d, 0x1}, 0x20) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x4, 0x5, 0x7fff, 0x20, 0xffffffffffffffff, 0x6, '\x00', 0x0, r0, 0x2, 0x4, 0x2, 0x9}, 0x48) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x7fffffff, 0x8}, 0xc) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000003380), 0x2, 0x0) close(r5) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r4, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800ff070000010000006fb8420447890000fbffffff0196800062dfa9008500000063000000950000000000000000000000000000000000300ac8e2ea5e08b9abb019f813b80af1cbb9f897f7d00af50ef42151aa9c45e949fbca45625f602a5ffa9efc6becf05de2539abbf63a45c3bd45b1a12b9b56d728eb9bd84404a6095c4a"], &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r6, 0x0, r4, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r4]}, 0x80) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r7}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r8}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r4, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b8100000000008d09100000000000183a00000300000000000000000000001835000005000000000000000000000018140000", @ANYRES32=r4, @ANYBLOB="00000000000000001830000004030000000000000000000018510000040000000000000000000000184b0000050000000000000000000000950000000000001c"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r8, r8]}, 0x80) openat$cgroup_ro(r4, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r4, 0x3, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=0xffffffffffffffff, 0x4) r10 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r10, &(0x7f0000003380), 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000740)={r2}, 0x8) r11 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r11, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_ext={0x1c, 0x4, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@alu={0x0, 0x1, 0x6, 0x9, 0x2, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000540)='syzkaller\x00', 0xbe, 0xfd, &(0x7f0000000580)=""/253, 0x40f00, 0xa, '\x00', r6, 0x0, r9, 0x8, &(0x7f00000006c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x800000, 0x4ab, 0x3}, 0x10, 0x615c, r3, 0x0, &(0x7f0000000780)}, 0x80) 23:31:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb014c18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000001c0)="7609325553f7c4c9e0aa5d0bd375e5de7b21c11be7a082c097976666d6be9d20cac3a96b253a919611001d8835d914e1971a1d2066d594c739de901a873354fa65241d06d29a38e0a9b23f750f92a2e4e5af3d2d207ba15d90a09ab9d754b78fa6a0fc657a4fde02e3a9502ee41a6aabf42a83939f3cbb7838"}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) [ 735.219931][ T820] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 735.227746][ T820] [ 735.255253][ T841] FAULT_INJECTION: forcing a failure. [ 735.255253][ T841] name failslab, interval 1, probability 0, space 0, times 0 [ 735.289557][ T841] CPU: 1 PID: 841 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 735.299458][ T841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 735.309361][ T841] Call Trace: [ 735.312475][ T841] [ 735.315254][ T841] dump_stack_lvl+0x151/0x1b7 [ 735.319767][ T841] ? bfq_pos_tree_add_move+0x43e/0x43e [ 735.325056][ T841] dump_stack+0x15/0x17 [ 735.329045][ T841] should_fail+0x3c0/0x510 [ 735.333300][ T841] __should_failslab+0x9f/0xe0 [ 735.337898][ T841] should_failslab+0x9/0x20 [ 735.342238][ T841] kmem_cache_alloc+0x4f/0x2f0 [ 735.346839][ T841] ? vm_area_dup+0x26/0x1d0 [ 735.351177][ T841] vm_area_dup+0x26/0x1d0 [ 735.355343][ T841] dup_mmap+0x6b8/0xea0 [ 735.359337][ T841] ? __delayed_free_task+0x20/0x20 [ 735.364285][ T841] ? mm_init+0x807/0x960 [ 735.368363][ T841] dup_mm+0x91/0x330 [ 735.372096][ T841] copy_mm+0x108/0x1b0 [ 735.376000][ T841] copy_process+0x1295/0x3250 [ 735.380514][ T841] ? proc_fail_nth_write+0x213/0x290 [ 735.385634][ T841] ? proc_fail_nth_read+0x220/0x220 [ 735.390671][ T841] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 735.395616][ T841] ? vfs_write+0x9af/0x1050 [ 735.399954][ T841] ? vmacache_update+0xb7/0x120 [ 735.404643][ T841] kernel_clone+0x22d/0x990 [ 735.408983][ T841] ? file_end_write+0x1b0/0x1b0 [ 735.413668][ T841] ? __kasan_check_write+0x14/0x20 [ 735.418616][ T841] ? create_io_thread+0x1e0/0x1e0 [ 735.423479][ T841] ? __mutex_lock_slowpath+0x10/0x10 [ 735.428601][ T841] __x64_sys_clone+0x289/0x310 [ 735.433197][ T841] ? __do_sys_vfork+0x130/0x130 [ 735.437885][ T841] ? debug_smp_processor_id+0x17/0x20 [ 735.443094][ T841] do_syscall_64+0x44/0xd0 [ 735.447345][ T841] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 735.453076][ T841] RIP: 0033:0x7f14733430a9 [ 735.457327][ T841] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 735.476770][ T841] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:09 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 30) 23:31:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:09 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x101, 0x9, 0xf5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r0, r0, 0xffffffffffffffff, r0, r0, 0x1, r0]}, 0x80) 23:31:09 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x89, 0x8d, 0x1}, 0x20) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x4, 0x5, 0x7fff, 0x20, 0xffffffffffffffff, 0x6, '\x00', 0x0, r0, 0x2, 0x4, 0x2, 0x9}, 0x48) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x7fffffff, 0x8}, 0xc) (async) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000003380), 0x2, 0x0) (async) close(r5) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r4, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800ff070000010000006fb8420447890000fbffffff0196800062dfa9008500000063000000950000000000000000000000000000000000300ac8e2ea5e08b9abb019f813b80af1cbb9f897f7d00af50ef42151aa9c45e949fbca45625f602a5ffa9efc6becf05de2539abbf63a45c3bd45b1a12b9b56d728eb9bd84404a6095c4a"], &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r6, 0x0, r4, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r4]}, 0x80) (async) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r7}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r8}, 0xc) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r4, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b8100000000008d09100000000000183a00000300000000000000000000001835000005000000000000000000000018140000", @ANYRES32=r4, @ANYBLOB="00000000000000001830000004030000000000000000000018510000040000000000000000000000184b0000050000000000000000000000950000000000001c"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r8, r8]}, 0x80) (async) openat$cgroup_ro(r4, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r4, 0x3, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=0xffffffffffffffff, 0x4) r10 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r10, &(0x7f0000003380), 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000740)={r2}, 0x8) (async) r11 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r11, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_ext={0x1c, 0x4, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@alu={0x0, 0x1, 0x6, 0x9, 0x2, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000540)='syzkaller\x00', 0xbe, 0xfd, &(0x7f0000000580)=""/253, 0x40f00, 0xa, '\x00', r6, 0x0, r9, 0x8, &(0x7f00000006c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x800000, 0x4ab, 0x3}, 0x10, 0x615c, r3, 0x0, &(0x7f0000000780)}, 0x80) 23:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb016818"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 735.485013][ T841] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 735.492824][ T841] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 735.500635][ T841] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 735.508448][ T841] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 735.516259][ T841] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 735.524075][ T841] 23:31:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb016c18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 735.539426][ T856] FAULT_INJECTION: forcing a failure. [ 735.539426][ T856] name failslab, interval 1, probability 0, space 0, times 0 [ 735.557871][ T856] CPU: 1 PID: 856 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 735.567766][ T856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 735.577663][ T856] Call Trace: [ 735.580782][ T856] [ 735.583566][ T856] dump_stack_lvl+0x151/0x1b7 23:31:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:09 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x89, 0x8d, 0x1}, 0x20) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x4, 0x5, 0x7fff, 0x20, 0xffffffffffffffff, 0x6, '\x00', 0x0, r0, 0x2, 0x4, 0x2, 0x9}, 0x48) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x7fffffff, 0x8}, 0xc) (async) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async, rerun: 32) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (rerun: 32) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000003380), 0x2, 0x0) close(r5) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r4, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800ff070000010000006fb8420447890000fbffffff0196800062dfa9008500000063000000950000000000000000000000000000000000300ac8e2ea5e08b9abb019f813b80af1cbb9f897f7d00af50ef42151aa9c45e949fbca45625f602a5ffa9efc6becf05de2539abbf63a45c3bd45b1a12b9b56d728eb9bd84404a6095c4a"], &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r6, 0x0, r4, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r4]}, 0x80) (async) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r7}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r8}, 0xc) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, r1}, 0xc) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r4, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b8100000000008d09100000000000183a00000300000000000000000000001835000005000000000000000000000018140000", @ANYRES32=r4, @ANYBLOB="00000000000000001830000004030000000000000000000018510000040000000000000000000000184b0000050000000000000000000000950000000000001c"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r8, r8]}, 0x80) (async, rerun: 32) openat$cgroup_ro(r4, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r4, 0x3, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=0xffffffffffffffff, 0x4) r10 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r10, &(0x7f0000003380), 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000740)={r2}, 0x8) (async) r11 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r11, &(0x7f0000003380), 0x2, 0x0) (async, rerun: 32) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_ext={0x1c, 0x4, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@alu={0x0, 0x1, 0x6, 0x9, 0x2, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000540)='syzkaller\x00', 0xbe, 0xfd, &(0x7f0000000580)=""/253, 0x40f00, 0xa, '\x00', r6, 0x0, r9, 0x8, &(0x7f00000006c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x800000, 0x4ab, 0x3}, 0x10, 0x615c, r3, 0x0, &(0x7f0000000780)}, 0x80) (rerun: 32) [ 735.588077][ T856] ? bfq_pos_tree_add_move+0x43e/0x43e [ 735.593370][ T856] dump_stack+0x15/0x17 [ 735.597360][ T856] should_fail+0x3c0/0x510 [ 735.601614][ T856] __should_failslab+0x9f/0xe0 [ 735.606212][ T856] should_failslab+0x9/0x20 [ 735.610558][ T856] kmem_cache_alloc+0x4f/0x2f0 [ 735.615155][ T856] ? vm_area_dup+0x26/0x1d0 [ 735.619499][ T856] vm_area_dup+0x26/0x1d0 [ 735.623660][ T856] dup_mmap+0x6b8/0xea0 [ 735.627660][ T856] ? __delayed_free_task+0x20/0x20 [ 735.632598][ T856] ? mm_init+0x807/0x960 [ 735.636679][ T856] dup_mm+0x91/0x330 [ 735.640411][ T856] copy_mm+0x108/0x1b0 [ 735.644318][ T856] copy_process+0x1295/0x3250 [ 735.648832][ T856] ? proc_fail_nth_write+0x213/0x290 [ 735.653950][ T856] ? proc_fail_nth_read+0x220/0x220 [ 735.658988][ T856] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 735.663933][ T856] ? vfs_write+0x9af/0x1050 [ 735.668271][ T856] ? vmacache_update+0xb7/0x120 [ 735.672963][ T856] kernel_clone+0x22d/0x990 [ 735.677303][ T856] ? file_end_write+0x1b0/0x1b0 [ 735.681985][ T856] ? __kasan_check_write+0x14/0x20 [ 735.686934][ T856] ? create_io_thread+0x1e0/0x1e0 [ 735.691789][ T856] ? __mutex_lock_slowpath+0x10/0x10 [ 735.696907][ T856] __x64_sys_clone+0x289/0x310 [ 735.701508][ T856] ? __do_sys_vfork+0x130/0x130 [ 735.706195][ T856] ? debug_smp_processor_id+0x17/0x20 [ 735.711404][ T856] do_syscall_64+0x44/0xd0 [ 735.715657][ T856] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 735.721389][ T856] RIP: 0033:0x7f14733430a9 [ 735.725639][ T856] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 735.745089][ T856] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 735.753326][ T856] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 735.761140][ T856] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 735.768946][ T856] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 735.776758][ T856] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:09 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 31) 23:31:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 23:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb017418"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:09 executing program 0: close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2d, 'hugetlb'}]}, 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 735.784569][ T856] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 735.792383][ T856] [ 735.810799][ T895] FAULT_INJECTION: forcing a failure. [ 735.810799][ T895] name failslab, interval 1, probability 0, space 0, times 0 [ 735.824268][ T895] CPU: 0 PID: 895 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x7, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 735.834158][ T895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 735.844061][ T895] Call Trace: [ 735.847181][ T895] [ 735.849954][ T895] dump_stack_lvl+0x151/0x1b7 [ 735.854524][ T895] ? bfq_pos_tree_add_move+0x43e/0x43e [ 735.859765][ T895] dump_stack+0x15/0x17 [ 735.863756][ T895] should_fail+0x3c0/0x510 [ 735.868011][ T895] __should_failslab+0x9f/0xe0 [ 735.872609][ T895] should_failslab+0x9/0x20 [ 735.877033][ T895] kmem_cache_alloc+0x4f/0x2f0 [ 735.881658][ T895] ? anon_vma_fork+0x1b9/0x4f0 [ 735.886232][ T895] anon_vma_fork+0x1b9/0x4f0 [ 735.890658][ T895] dup_mmap+0x750/0xea0 [ 735.894654][ T895] ? __delayed_free_task+0x20/0x20 [ 735.899600][ T895] ? mm_init+0x807/0x960 [ 735.903679][ T895] dup_mm+0x91/0x330 [ 735.907410][ T895] copy_mm+0x108/0x1b0 [ 735.911315][ T895] copy_process+0x1295/0x3250 [ 735.915827][ T895] ? proc_fail_nth_write+0x213/0x290 [ 735.920949][ T895] ? proc_fail_nth_read+0x220/0x220 [ 735.925983][ T895] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 735.930934][ T895] ? vfs_write+0x9af/0x1050 [ 735.935269][ T895] ? vmacache_update+0xb7/0x120 [ 735.939956][ T895] kernel_clone+0x22d/0x990 [ 735.944299][ T895] ? file_end_write+0x1b0/0x1b0 [ 735.948985][ T895] ? __kasan_check_write+0x14/0x20 [ 735.953937][ T895] ? create_io_thread+0x1e0/0x1e0 [ 735.958796][ T895] ? __mutex_lock_slowpath+0x10/0x10 [ 735.963912][ T895] __x64_sys_clone+0x289/0x310 [ 735.968513][ T895] ? __do_sys_vfork+0x130/0x130 [ 735.973200][ T895] ? debug_smp_processor_id+0x17/0x20 [ 735.978408][ T895] do_syscall_64+0x44/0xd0 [ 735.982660][ T895] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 735.988387][ T895] RIP: 0033:0x7f14733430a9 [ 735.992640][ T895] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 736.012083][ T895] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 736.020326][ T895] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 736.028152][ T895] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:09 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 32) 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x6, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7c00}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb017a18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:09 executing program 0: close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2d, 'hugetlb'}]}, 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x5, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 736.035949][ T895] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 736.043762][ T895] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 736.051659][ T895] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 736.059473][ T895] 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb018c18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 736.108498][ T929] FAULT_INJECTION: forcing a failure. [ 736.108498][ T929] name failslab, interval 1, probability 0, space 0, times 0 [ 736.133534][ T929] CPU: 1 PID: 929 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 736.143438][ T929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 736.153330][ T929] Call Trace: [ 736.156451][ T929] [ 736.159229][ T929] dump_stack_lvl+0x151/0x1b7 [ 736.163742][ T929] ? bfq_pos_tree_add_move+0x43e/0x43e [ 736.169040][ T929] dump_stack+0x15/0x17 [ 736.173035][ T929] should_fail+0x3c0/0x510 [ 736.177286][ T929] __should_failslab+0x9f/0xe0 [ 736.181887][ T929] should_failslab+0x9/0x20 [ 736.186221][ T929] kmem_cache_alloc+0x4f/0x2f0 [ 736.190825][ T929] ? vm_area_dup+0x26/0x1d0 [ 736.195162][ T929] ? __kasan_check_read+0x11/0x20 [ 736.200022][ T929] vm_area_dup+0x26/0x1d0 [ 736.204189][ T929] dup_mmap+0x6b8/0xea0 [ 736.208180][ T929] ? __delayed_free_task+0x20/0x20 [ 736.213126][ T929] ? mm_init+0x807/0x960 [ 736.217205][ T929] dup_mm+0x91/0x330 [ 736.220940][ T929] copy_mm+0x108/0x1b0 [ 736.224843][ T929] copy_process+0x1295/0x3250 [ 736.229357][ T929] ? proc_fail_nth_write+0x213/0x290 [ 736.234479][ T929] ? proc_fail_nth_read+0x220/0x220 [ 736.239513][ T929] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 736.244458][ T929] ? vfs_write+0x9af/0x1050 [ 736.248798][ T929] ? vmacache_update+0xb7/0x120 [ 736.253485][ T929] kernel_clone+0x22d/0x990 [ 736.257829][ T929] ? file_end_write+0x1b0/0x1b0 [ 736.262511][ T929] ? __kasan_check_write+0x14/0x20 [ 736.267460][ T929] ? create_io_thread+0x1e0/0x1e0 [ 736.272320][ T929] ? __mutex_lock_slowpath+0x10/0x10 [ 736.277442][ T929] __x64_sys_clone+0x289/0x310 [ 736.282041][ T929] ? __do_sys_vfork+0x130/0x130 [ 736.286727][ T929] ? debug_smp_processor_id+0x17/0x20 [ 736.291959][ T929] do_syscall_64+0x44/0xd0 [ 736.296189][ T929] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 736.301916][ T929] RIP: 0033:0x7f14733430a9 [ 736.306171][ T929] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 736.325621][ T929] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 736.333855][ T929] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 736.341668][ T929] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 736.349478][ T929] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:09 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 33) 23:31:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:09 executing program 0: close(0xffffffffffffffff) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2d, 'hugetlb'}]}, 0x9) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01005c"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:09 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000000)={&(0x7f0000000980)="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", &(0x7f00000002c0)=""/130, &(0x7f0000000740)="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", &(0x7f0000000180)="625fa611cc891ab9f6eaa49a383d0ab750d4676862938d2d0822d8137ce94fe6452377a886a28d9bda99e9b2fb9224ae02736c6437dda2e20b9fefdc45460ee86d254db25283822fc223e5ca39ba2b2354d1791d479fa600c3195c4f39a07ee75726d0bec07d844771e3744b0f973074bb71aff605799927cbcb896ec225e7c20e66b365c7f0f514513d5f465754776e4974fc49b6284907c40fcc6d6d04d39a0c80cf03226753e9ac1561a441ffb3a048ae161bf4b92ff8d6130054f2ab687e9d59d697a19dedd8891620af004afa1d22b0d624f908", 0x8, 0x1}, 0x38) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000000c0)=""/137, 0x5c, 0x89}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r0, 0x20, &(0x7f0000000600)={&(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000680)=""/151, 0x97}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0), 0x2, 0x0) [ 736.357289][ T929] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 736.365102][ T929] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 736.372914][ T929] 23:31:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) [ 736.427796][ T952] FAULT_INJECTION: forcing a failure. [ 736.427796][ T952] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 736.444263][ T952] CPU: 1 PID: 952 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 736.454163][ T952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 736.464057][ T952] Call Trace: [ 736.467177][ T952] [ 736.469958][ T952] dump_stack_lvl+0x151/0x1b7 [ 736.474470][ T952] ? bfq_pos_tree_add_move+0x43e/0x43e [ 736.479763][ T952] ? stack_trace_save+0x1f0/0x1f0 [ 736.484623][ T952] ? __kernel_text_address+0x9a/0x110 [ 736.489831][ T952] dump_stack+0x15/0x17 [ 736.493823][ T952] should_fail+0x3c0/0x510 [ 736.498078][ T952] should_fail_alloc_page+0x58/0x70 [ 736.503110][ T952] __alloc_pages+0x1de/0x7c0 [ 736.507536][ T952] ? stack_trace_save+0x12d/0x1f0 [ 736.512397][ T952] ? stack_trace_snprint+0x100/0x100 [ 736.517519][ T952] ? __count_vm_events+0x30/0x30 [ 736.522293][ T952] ? __kasan_slab_alloc+0xc4/0xe0 [ 736.527151][ T952] ? __kasan_slab_alloc+0xb2/0xe0 [ 736.532011][ T952] ? kmem_cache_alloc+0x189/0x2f0 [ 736.536872][ T952] ? anon_vma_fork+0x1b9/0x4f0 [ 736.541475][ T952] get_zeroed_page+0x19/0x40 [ 736.545899][ T952] __pud_alloc+0x8b/0x260 [ 736.550415][ T952] ? do_handle_mm_fault+0x2370/0x2370 [ 736.555623][ T952] copy_page_range+0xd9e/0x1090 [ 736.560308][ T952] ? pfn_valid+0x1e0/0x1e0 [ 736.564560][ T952] dup_mmap+0x99f/0xea0 [ 736.568555][ T952] ? __delayed_free_task+0x20/0x20 [ 736.573501][ T952] ? mm_init+0x807/0x960 [ 736.577578][ T952] dup_mm+0x91/0x330 [ 736.581310][ T952] copy_mm+0x108/0x1b0 [ 736.585216][ T952] copy_process+0x1295/0x3250 [ 736.589730][ T952] ? proc_fail_nth_write+0x213/0x290 [ 736.594852][ T952] ? proc_fail_nth_read+0x220/0x220 [ 736.599885][ T952] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 736.604833][ T952] ? vfs_write+0x9af/0x1050 [ 736.609170][ T952] ? vmacache_update+0xb7/0x120 [ 736.613857][ T952] kernel_clone+0x22d/0x990 [ 736.618197][ T952] ? file_end_write+0x1b0/0x1b0 [ 736.622885][ T952] ? __kasan_check_write+0x14/0x20 [ 736.627832][ T952] ? create_io_thread+0x1e0/0x1e0 [ 736.632697][ T952] ? __mutex_lock_slowpath+0x10/0x10 [ 736.637814][ T952] __x64_sys_clone+0x289/0x310 [ 736.642418][ T952] ? __do_sys_vfork+0x130/0x130 [ 736.647102][ T952] ? debug_smp_processor_id+0x17/0x20 [ 736.652307][ T952] do_syscall_64+0x44/0xd0 [ 736.656563][ T952] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 736.662291][ T952] RIP: 0033:0x7f14733430a9 [ 736.666544][ T952] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 736.685984][ T952] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 736.694229][ T952] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 736.702042][ T952] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 736.709853][ T952] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 736.717662][ T952] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:10 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 34) 23:31:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, &(0x7f0000000700), &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:10 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000000)={&(0x7f0000000980)="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", &(0x7f00000002c0)=""/130, &(0x7f0000000740)="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", &(0x7f0000000180)="625fa611cc891ab9f6eaa49a383d0ab750d4676862938d2d0822d8137ce94fe6452377a886a28d9bda99e9b2fb9224ae02736c6437dda2e20b9fefdc45460ee86d254db25283822fc223e5ca39ba2b2354d1791d479fa600c3195c4f39a07ee75726d0bec07d844771e3744b0f973074bb71aff605799927cbcb896ec225e7c20e66b365c7f0f514513d5f465754776e4974fc49b6284907c40fcc6d6d04d39a0c80cf03226753e9ac1561a441ffb3a048ae161bf4b92ff8d6130054f2ab687e9d59d697a19dedd8891620af004afa1d22b0d624f908", 0x8, 0x1}, 0x38) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000000c0)=""/137, 0x5c, 0x89}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r0, 0x20, &(0x7f0000000600)={&(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000680)=""/151, 0x97}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0), 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000000)={&(0x7f0000000980)="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", &(0x7f00000002c0)=""/130, &(0x7f0000000740)="8fa625651528d88857d7c41f16281dc286771754d141e3479cde3c68393f979c217d8ec201b0c0faad6239c0773a32fcb9af4730f02d123aea3309c893af6cd46718ae2578fd6f2f63cc14bf820bafdd39cd69ccb0a3568e31a2179a062731cdb02dfde6437d97eb2b3dc18c8f21d0300e75f87b8f50ceac45acc710dbbbd77fce3ceaf806b372664c8b3ae4a3eec4844b0bf7fa94dbdd9aab60867ac16d000000000000000000000000aa3551ea2a3437910d14c3574b9e78808acf85236f190caafd6184d8851e0f2ddadf72ee7e6d841534add1f59a5a24b2714d2bea29e10b25bda84aa60c516279e48948d7f08d4633d7ca5e072caec8f7fa0f122a897cc9568b6468c43f38b73fa60f2ae541373a4747bb0593154e3ebf6a674c18d070faf75c56e2281157f6c1444d5595a526a8820d3180c9ab4a", &(0x7f0000000180)="625fa611cc891ab9f6eaa49a383d0ab750d4676862938d2d0822d8137ce94fe6452377a886a28d9bda99e9b2fb9224ae02736c6437dda2e20b9fefdc45460ee86d254db25283822fc223e5ca39ba2b2354d1791d479fa600c3195c4f39a07ee75726d0bec07d844771e3744b0f973074bb71aff605799927cbcb896ec225e7c20e66b365c7f0f514513d5f465754776e4974fc49b6284907c40fcc6d6d04d39a0c80cf03226753e9ac1561a441ffb3a048ae161bf4b92ff8d6130054f2ab687e9d59d697a19dedd8891620af004afa1d22b0d624f908", 0x8, 0x1}, 0x38) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000000c0)=""/137, 0x5c, 0x89}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r0, 0x20, &(0x7f0000000600)={&(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000680)=""/151, 0x97}}, 0x10) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0), 0x2, 0x0) (async) 23:31:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01000a"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000001000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x3, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, &(0x7f0000000700), &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, &(0x7f0000000700), &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 736.725480][ T952] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 736.733288][ T952] [ 736.763231][ T973] FAULT_INJECTION: forcing a failure. [ 736.763231][ T973] name failslab, interval 1, probability 0, space 0, times 0 23:31:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x58, &(0x7f00000001c0)=""/88, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01005c"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 736.780328][ T973] CPU: 0 PID: 973 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 736.790231][ T973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 736.800125][ T973] Call Trace: [ 736.803252][ T973] [ 736.806025][ T973] dump_stack_lvl+0x151/0x1b7 [ 736.810543][ T973] ? bfq_pos_tree_add_move+0x43e/0x43e [ 736.815838][ T973] dump_stack+0x15/0x17 [ 736.819829][ T973] should_fail+0x3c0/0x510 [ 736.824080][ T973] __should_failslab+0x9f/0xe0 [ 736.828680][ T973] should_failslab+0x9/0x20 [ 736.833019][ T973] kmem_cache_alloc+0x4f/0x2f0 [ 736.837619][ T973] ? anon_vma_clone+0xa1/0x4f0 [ 736.842220][ T973] anon_vma_clone+0xa1/0x4f0 [ 736.846650][ T973] anon_vma_fork+0x91/0x4f0 [ 736.850987][ T973] ? anon_vma_name+0x4c/0x70 [ 736.855410][ T973] dup_mmap+0x750/0xea0 [ 736.859406][ T973] ? __delayed_free_task+0x20/0x20 [ 736.864349][ T973] ? mm_init+0x807/0x960 [ 736.868425][ T973] dup_mm+0x91/0x330 [ 736.872156][ T973] copy_mm+0x108/0x1b0 [ 736.876149][ T973] copy_process+0x1295/0x3250 [ 736.880666][ T973] ? proc_fail_nth_write+0x213/0x290 [ 736.885783][ T973] ? proc_fail_nth_read+0x220/0x220 [ 736.890818][ T973] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 736.895764][ T973] ? vfs_write+0x9af/0x1050 [ 736.900103][ T973] ? vmacache_update+0xb7/0x120 [ 736.904791][ T973] kernel_clone+0x22d/0x990 [ 736.909131][ T973] ? file_end_write+0x1b0/0x1b0 [ 736.913818][ T973] ? __kasan_check_write+0x14/0x20 [ 736.918764][ T973] ? create_io_thread+0x1e0/0x1e0 [ 736.923625][ T973] ? __mutex_lock_slowpath+0x10/0x10 [ 736.928759][ T973] __x64_sys_clone+0x289/0x310 [ 736.933347][ T973] ? __do_sys_vfork+0x130/0x130 [ 736.938125][ T973] ? debug_smp_processor_id+0x17/0x20 [ 736.943333][ T973] do_syscall_64+0x44/0xd0 [ 736.947593][ T973] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 736.953309][ T973] RIP: 0033:0x7f14733430a9 [ 736.957562][ T973] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:31:10 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 35) 23:31:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], 0x0, 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:10 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000000)={&(0x7f0000000980)="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", &(0x7f00000002c0)=""/130, &(0x7f0000000740)="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", &(0x7f0000000180)="625fa611cc891ab9f6eaa49a383d0ab750d4676862938d2d0822d8137ce94fe6452377a886a28d9bda99e9b2fb9224ae02736c6437dda2e20b9fefdc45460ee86d254db25283822fc223e5ca39ba2b2354d1791d479fa600c3195c4f39a07ee75726d0bec07d844771e3744b0f973074bb71aff605799927cbcb896ec225e7c20e66b365c7f0f514513d5f465754776e4974fc49b6284907c40fcc6d6d04d39a0c80cf03226753e9ac1561a441ffb3a048ae161bf4b92ff8d6130054f2ab687e9d59d697a19dedd8891620af004afa1d22b0d624f908", 0x8, 0x1}, 0x38) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000000c0)=""/137, 0x5c, 0x89}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r0, 0x20, &(0x7f0000000600)={&(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000680)=""/151, 0x97}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0), 0x2, 0x0) 23:31:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], 0x0, 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000010000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 736.977230][ T973] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 736.985473][ T973] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 736.993626][ T973] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 737.001445][ T973] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 737.009246][ T973] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 737.017058][ T973] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 737.024873][ T973] 23:31:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/145, 0x91, 0x0, &(0x7f0000000280)=""/4096, 0x1000}}, 0x10) 23:31:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100ff"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], 0x0, 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 737.069938][ T1008] FAULT_INJECTION: forcing a failure. [ 737.069938][ T1008] name failslab, interval 1, probability 0, space 0, times 0 [ 737.100770][ T1008] CPU: 1 PID: 1008 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 737.110762][ T1008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 737.120657][ T1008] Call Trace: [ 737.123778][ T1008] [ 737.126559][ T1008] dump_stack_lvl+0x151/0x1b7 [ 737.131064][ T1008] ? bfq_pos_tree_add_move+0x43e/0x43e [ 737.136358][ T1008] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 737.142617][ T1008] dump_stack+0x15/0x17 [ 737.146607][ T1008] should_fail+0x3c0/0x510 [ 737.150852][ T1008] __should_failslab+0x9f/0xe0 [ 737.155452][ T1008] should_failslab+0x9/0x20 [ 737.159798][ T1008] kmem_cache_alloc+0x4f/0x2f0 [ 737.164392][ T1008] ? anon_vma_fork+0xf7/0x4f0 [ 737.168904][ T1008] anon_vma_fork+0xf7/0x4f0 [ 737.173245][ T1008] ? anon_vma_name+0x4c/0x70 [ 737.177672][ T1008] dup_mmap+0x750/0xea0 [ 737.181667][ T1008] ? __delayed_free_task+0x20/0x20 [ 737.186610][ T1008] ? mm_init+0x807/0x960 [ 737.190700][ T1008] dup_mm+0x91/0x330 [ 737.194425][ T1008] copy_mm+0x108/0x1b0 [ 737.198334][ T1008] copy_process+0x1295/0x3250 [ 737.202842][ T1008] ? proc_fail_nth_write+0x213/0x290 [ 737.207962][ T1008] ? proc_fail_nth_read+0x220/0x220 [ 737.212996][ T1008] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 737.217942][ T1008] ? vfs_write+0x9af/0x1050 [ 737.222282][ T1008] ? vmacache_update+0xb7/0x120 [ 737.226971][ T1008] kernel_clone+0x22d/0x990 [ 737.231310][ T1008] ? file_end_write+0x1b0/0x1b0 [ 737.235999][ T1008] ? __kasan_check_write+0x14/0x20 [ 737.240945][ T1008] ? create_io_thread+0x1e0/0x1e0 [ 737.245803][ T1008] ? __mutex_lock_slowpath+0x10/0x10 [ 737.250927][ T1008] __x64_sys_clone+0x289/0x310 [ 737.255525][ T1008] ? __do_sys_vfork+0x130/0x130 [ 737.260213][ T1008] ? debug_smp_processor_id+0x17/0x20 [ 737.265421][ T1008] do_syscall_64+0x44/0xd0 [ 737.269672][ T1008] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 737.275402][ T1008] RIP: 0033:0x7f14733430a9 [ 737.279654][ T1008] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 737.299095][ T1008] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 737.307340][ T1008] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:10 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36) 23:31:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000100000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/145, 0x91, 0x0, &(0x7f0000000280)=""/4096, 0x1000}}, 0x10) 23:31:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x0, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x8, 0x8d, 0x1}, 0x20) 23:31:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x0, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/145, 0x91, 0x0, &(0x7f0000000280)=""/4096, 0x1000}}, 0x10) [ 737.315151][ T1008] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 737.322961][ T1008] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 737.330777][ T1008] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 737.338587][ T1008] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 737.346403][ T1008] 23:31:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0xa, 0x8d, 0x1}, 0x20) 23:31:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 737.392374][ T1035] FAULT_INJECTION: forcing a failure. [ 737.392374][ T1035] name failslab, interval 1, probability 0, space 0, times 0 [ 737.421857][ T1035] CPU: 0 PID: 1035 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 737.431851][ T1035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 737.441850][ T1035] Call Trace: [ 737.444954][ T1035] [ 737.447724][ T1035] dump_stack_lvl+0x151/0x1b7 [ 737.452234][ T1035] ? bfq_pos_tree_add_move+0x43e/0x43e [ 737.457530][ T1035] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 737.463780][ T1035] dump_stack+0x15/0x17 [ 737.467770][ T1035] should_fail+0x3c0/0x510 [ 737.472024][ T1035] __should_failslab+0x9f/0xe0 [ 737.476623][ T1035] should_failslab+0x9/0x20 [ 737.480963][ T1035] kmem_cache_alloc+0x4f/0x2f0 [ 737.485562][ T1035] ? anon_vma_fork+0xf7/0x4f0 [ 737.490077][ T1035] anon_vma_fork+0xf7/0x4f0 [ 737.494429][ T1035] ? anon_vma_name+0x4c/0x70 [ 737.498842][ T1035] dup_mmap+0x750/0xea0 [ 737.502838][ T1035] ? __delayed_free_task+0x20/0x20 [ 737.507787][ T1035] ? mm_init+0x807/0x960 [ 737.511862][ T1035] dup_mm+0x91/0x330 [ 737.515593][ T1035] copy_mm+0x108/0x1b0 [ 737.519499][ T1035] copy_process+0x1295/0x3250 [ 737.524015][ T1035] ? proc_fail_nth_write+0x213/0x290 [ 737.529141][ T1035] ? proc_fail_nth_read+0x220/0x220 [ 737.534168][ T1035] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 737.539119][ T1035] ? vfs_write+0x9af/0x1050 [ 737.543456][ T1035] ? vmacache_update+0xb7/0x120 [ 737.548141][ T1035] kernel_clone+0x22d/0x990 [ 737.552482][ T1035] ? file_end_write+0x1b0/0x1b0 [ 737.557167][ T1035] ? __kasan_check_write+0x14/0x20 [ 737.562114][ T1035] ? create_io_thread+0x1e0/0x1e0 [ 737.566975][ T1035] ? __mutex_lock_slowpath+0x10/0x10 [ 737.572096][ T1035] __x64_sys_clone+0x289/0x310 [ 737.576699][ T1035] ? __do_sys_vfork+0x130/0x130 [ 737.581386][ T1035] ? debug_smp_processor_id+0x17/0x20 [ 737.586590][ T1035] do_syscall_64+0x44/0xd0 [ 737.590843][ T1035] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 737.596577][ T1035] RIP: 0033:0x7f14733430a9 [ 737.600825][ T1035] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 737.620365][ T1035] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 737.628713][ T1035] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:11 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 37) 23:31:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x0, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0xc, 0x8d, 0x1}, 0x20) 23:31:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x0, 0xa, 0xfff80000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0xfffffef7, 0x8d, 0x1}, 0x20) 23:31:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1]}, 0x80) 23:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x18, 0x8d, 0x1}, 0x20) 23:31:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x64, 0x8d, 0x1}, 0x20) [ 737.636520][ T1035] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 737.644331][ T1035] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 737.652227][ T1035] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 737.660045][ T1035] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 737.667855][ T1035] 23:31:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 737.722379][ T1064] FAULT_INJECTION: forcing a failure. [ 737.722379][ T1064] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 737.747679][ T1064] CPU: 0 PID: 1064 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 737.757664][ T1064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 737.767562][ T1064] Call Trace: [ 737.770680][ T1064] [ 737.773457][ T1064] dump_stack_lvl+0x151/0x1b7 [ 737.777971][ T1064] ? bfq_pos_tree_add_move+0x43e/0x43e [ 737.783265][ T1064] dump_stack+0x15/0x17 [ 737.787259][ T1064] should_fail+0x3c0/0x510 [ 737.791510][ T1064] should_fail_alloc_page+0x58/0x70 [ 737.796545][ T1064] __alloc_pages+0x1de/0x7c0 [ 737.800974][ T1064] ? __pud_alloc+0x218/0x260 [ 737.805398][ T1064] ? do_handle_mm_fault+0x2370/0x2370 [ 737.810606][ T1064] ? __count_vm_events+0x30/0x30 [ 737.815389][ T1064] ? copy_page_range+0xecc/0x1090 [ 737.820242][ T1064] allocate_slab+0x62/0x580 [ 737.824579][ T1064] ___slab_alloc+0x2e2/0x6f0 [ 737.829005][ T1064] ? vm_area_dup+0x26/0x1d0 [ 737.833354][ T1064] ? vm_area_dup+0x26/0x1d0 [ 737.837771][ T1064] __slab_alloc+0x4a/0x90 [ 737.841938][ T1064] kmem_cache_alloc+0x205/0x2f0 [ 737.846627][ T1064] ? vm_area_dup+0x26/0x1d0 [ 737.850966][ T1064] vm_area_dup+0x26/0x1d0 [ 737.855131][ T1064] dup_mmap+0x6b8/0xea0 [ 737.859211][ T1064] ? __delayed_free_task+0x20/0x20 [ 737.864157][ T1064] ? mm_init+0x807/0x960 [ 737.868242][ T1064] dup_mm+0x91/0x330 [ 737.871969][ T1064] copy_mm+0x108/0x1b0 [ 737.876049][ T1064] copy_process+0x1295/0x3250 [ 737.880560][ T1064] ? proc_fail_nth_write+0x213/0x290 [ 737.885681][ T1064] ? proc_fail_nth_read+0x220/0x220 [ 737.890716][ T1064] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 737.895668][ T1064] ? vfs_write+0x9af/0x1050 [ 737.900002][ T1064] ? vmacache_update+0xb7/0x120 [ 737.904690][ T1064] kernel_clone+0x22d/0x990 [ 737.909031][ T1064] ? file_end_write+0x1b0/0x1b0 [ 737.913715][ T1064] ? __kasan_check_write+0x14/0x20 [ 737.918663][ T1064] ? create_io_thread+0x1e0/0x1e0 [ 737.923524][ T1064] ? __mutex_lock_slowpath+0x10/0x10 [ 737.928758][ T1064] __x64_sys_clone+0x289/0x310 [ 737.933361][ T1064] ? __do_sys_vfork+0x130/0x130 [ 737.938042][ T1064] ? debug_smp_processor_id+0x17/0x20 [ 737.943249][ T1064] do_syscall_64+0x44/0xd0 [ 737.947502][ T1064] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 737.953228][ T1064] RIP: 0033:0x7f14733430a9 [ 737.957480][ T1064] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 737.976921][ T1064] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 737.985170][ T1064] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 737.993068][ T1064] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 738.000876][ T1064] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 738.008690][ T1064] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:11 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 38) 23:31:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0xfffffef7, 0x8d, 0x1}, 0x20) 23:31:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:31:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x1001, 0x8d, 0x1}, 0x20) 23:31:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0xfffffef7, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0xfffffef7, 0x8d, 0x1}, 0x20) (async) [ 738.016500][ T1064] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 738.024313][ T1064] 23:31:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0xfffffef7, 0x8d, 0x1}, 0x20) 23:31:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 738.118968][ T1094] FAULT_INJECTION: forcing a failure. [ 738.118968][ T1094] name failslab, interval 1, probability 0, space 0, times 0 [ 738.134868][ T1094] CPU: 0 PID: 1094 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 738.144848][ T1094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 738.154744][ T1094] Call Trace: [ 738.157866][ T1094] [ 738.160645][ T1094] dump_stack_lvl+0x151/0x1b7 [ 738.165157][ T1094] ? bfq_pos_tree_add_move+0x43e/0x43e [ 738.170451][ T1094] dump_stack+0x15/0x17 [ 738.174441][ T1094] should_fail+0x3c0/0x510 [ 738.178698][ T1094] __should_failslab+0x9f/0xe0 [ 738.183296][ T1094] should_failslab+0x9/0x20 [ 738.187637][ T1094] kmem_cache_alloc+0x4f/0x2f0 [ 738.192234][ T1094] ? anon_vma_fork+0x1b9/0x4f0 [ 738.196841][ T1094] anon_vma_fork+0x1b9/0x4f0 [ 738.201264][ T1094] dup_mmap+0x750/0xea0 [ 738.205256][ T1094] ? __delayed_free_task+0x20/0x20 [ 738.210198][ T1094] ? mm_init+0x807/0x960 [ 738.214279][ T1094] dup_mm+0x91/0x330 [ 738.218010][ T1094] copy_mm+0x108/0x1b0 [ 738.221998][ T1094] copy_process+0x1295/0x3250 [ 738.226514][ T1094] ? proc_fail_nth_write+0x213/0x290 [ 738.231633][ T1094] ? proc_fail_nth_read+0x220/0x220 [ 738.236668][ T1094] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 738.241616][ T1094] ? vfs_write+0x9af/0x1050 [ 738.245955][ T1094] ? vmacache_update+0xb7/0x120 [ 738.250644][ T1094] kernel_clone+0x22d/0x990 [ 738.254982][ T1094] ? file_end_write+0x1b0/0x1b0 [ 738.259668][ T1094] ? __kasan_check_write+0x14/0x20 [ 738.264617][ T1094] ? create_io_thread+0x1e0/0x1e0 [ 738.269476][ T1094] ? __mutex_lock_slowpath+0x10/0x10 [ 738.274595][ T1094] __x64_sys_clone+0x289/0x310 [ 738.279198][ T1094] ? __do_sys_vfork+0x130/0x130 [ 738.283885][ T1094] ? debug_smp_processor_id+0x17/0x20 [ 738.289091][ T1094] do_syscall_64+0x44/0xd0 [ 738.293345][ T1094] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 738.299075][ T1094] RIP: 0033:0x7f14733430a9 [ 738.303397][ T1094] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 738.322769][ T1094] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 738.331012][ T1094] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 738.338823][ T1094] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 738.346635][ T1094] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 738.354452][ T1094] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 738.362261][ T1094] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 23:31:11 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 39) 23:31:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0xfffffef7, 0x8d, 0x1}, 0x20) 23:31:11 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1c, 0x200, 0xfffffa5f, 0x0, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x5, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r5]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x20, 0x2, 0x7, 0x9, 0x0, 0x825, 0x41820, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x10001, 0x6}, 0x98020, 0x100000000, 0x1, 0x7, 0x2, 0x13, 0x59, 0x0, 0xafb, 0x0, 0x100000001}, r0, 0x3, r2, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5f5e0ff, 0x8d, 0x1}, 0x20) 23:31:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0xfffffef7, 0x8d, 0x1}, 0x20) 23:31:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x2000005c, 0x8d, 0x1}, 0x20) [ 738.370073][ T1094] [ 738.386936][ T1097] FAULT_INJECTION: forcing a failure. [ 738.386936][ T1097] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:31:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:11 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1c, 0x200, 0xfffffa5f, 0x0, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x5, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r5]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) (async) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x20, 0x2, 0x7, 0x9, 0x0, 0x825, 0x41820, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x10001, 0x6}, 0x98020, 0x100000000, 0x1, 0x7, 0x2, 0x13, 0x59, 0x0, 0xafb, 0x0, 0x100000001}, r0, 0x3, r2, 0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 738.411194][ T1097] CPU: 1 PID: 1097 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 738.421179][ T1097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 738.431077][ T1097] Call Trace: [ 738.434201][ T1097] [ 738.436977][ T1097] dump_stack_lvl+0x151/0x1b7 [ 738.441515][ T1097] ? bfq_pos_tree_add_move+0x43e/0x43e [ 738.446788][ T1097] dump_stack+0x15/0x17 [ 738.450775][ T1097] should_fail+0x3c0/0x510 [ 738.455028][ T1097] should_fail_alloc_page+0x58/0x70 [ 738.460067][ T1097] __alloc_pages+0x1de/0x7c0 [ 738.464495][ T1097] ? __count_vm_events+0x30/0x30 [ 738.469272][ T1097] ? dup_mm+0x91/0x330 [ 738.473170][ T1097] ? copy_mm+0x108/0x1b0 [ 738.477281][ T1097] ? copy_process+0x1295/0x3250 [ 738.481935][ T1097] ? kernel_clone+0x22d/0x990 [ 738.486454][ T1097] ? __x64_sys_clone+0x289/0x310 [ 738.491223][ T1097] pte_alloc_one+0x73/0x1b0 [ 738.495565][ T1097] ? pfn_modify_allowed+0x2e0/0x2e0 [ 738.500599][ T1097] ? __kasan_check_write+0x14/0x20 [ 738.505540][ T1097] ? __set_page_owner+0x2ee/0x310 [ 738.510410][ T1097] __pte_alloc+0x86/0x350 [ 738.514568][ T1097] ? post_alloc_hook+0x1ab/0x1b0 [ 738.519347][ T1097] ? free_pgtables+0x210/0x210 [ 738.523942][ T1097] ? get_page_from_freelist+0x38b/0x400 [ 738.529415][ T1097] copy_pte_range+0x1b1f/0x20b0 [ 738.534109][ T1097] ? __kunmap_atomic+0x80/0x80 [ 738.538701][ T1097] ? __pud_alloc+0x260/0x260 [ 738.543123][ T1097] ? __pud_alloc+0x218/0x260 [ 738.547550][ T1097] ? do_handle_mm_fault+0x2370/0x2370 [ 738.552761][ T1097] copy_page_range+0xc1e/0x1090 [ 738.557442][ T1097] ? pfn_valid+0x1e0/0x1e0 [ 738.561694][ T1097] dup_mmap+0x99f/0xea0 [ 738.565694][ T1097] ? __delayed_free_task+0x20/0x20 [ 738.570644][ T1097] ? mm_init+0x807/0x960 [ 738.574712][ T1097] dup_mm+0x91/0x330 [ 738.578445][ T1097] copy_mm+0x108/0x1b0 [ 738.582350][ T1097] copy_process+0x1295/0x3250 [ 738.586863][ T1097] ? proc_fail_nth_write+0x213/0x290 [ 738.591985][ T1097] ? proc_fail_nth_read+0x220/0x220 [ 738.597021][ T1097] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 738.601970][ T1097] ? vfs_write+0x9af/0x1050 [ 738.606307][ T1097] ? vmacache_update+0xb7/0x120 [ 738.610993][ T1097] kernel_clone+0x22d/0x990 [ 738.615333][ T1097] ? file_end_write+0x1b0/0x1b0 [ 738.620018][ T1097] ? __kasan_check_write+0x14/0x20 [ 738.624969][ T1097] ? create_io_thread+0x1e0/0x1e0 [ 738.629826][ T1097] ? __mutex_lock_slowpath+0x10/0x10 [ 738.634948][ T1097] __x64_sys_clone+0x289/0x310 [ 738.639548][ T1097] ? __do_sys_vfork+0x130/0x130 [ 738.644247][ T1097] ? debug_smp_processor_id+0x17/0x20 [ 738.649444][ T1097] do_syscall_64+0x44/0xd0 [ 738.653695][ T1097] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 738.659427][ T1097] RIP: 0033:0x7f14733430a9 [ 738.663677][ T1097] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 738.683219][ T1097] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 738.691452][ T1097] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 738.699442][ T1097] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 738.707254][ T1097] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:12 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 40) 23:31:12 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:31:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x2}, 0x20) 23:31:12 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) (async) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1c, 0x200, 0xfffffa5f, 0x0, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x5, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r5]}, 0x80) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x20, 0x2, 0x7, 0x9, 0x0, 0x825, 0x41820, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x10001, 0x6}, 0x98020, 0x100000000, 0x1, 0x7, 0x2, 0x13, 0x59, 0x0, 0xafb, 0x0, 0x100000001}, r0, 0x3, r2, 0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 738.715060][ T1097] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 738.722957][ T1097] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 738.730861][ T1097] [ 738.751417][ T1128] FAULT_INJECTION: forcing a failure. [ 738.751417][ T1128] name failslab, interval 1, probability 0, space 0, times 0 [ 738.771657][ T1128] CPU: 0 PID: 1128 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 738.781646][ T1128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 738.791541][ T1128] Call Trace: [ 738.794756][ T1128] [ 738.797528][ T1128] dump_stack_lvl+0x151/0x1b7 [ 738.802040][ T1128] ? bfq_pos_tree_add_move+0x43e/0x43e [ 738.807339][ T1128] dump_stack+0x15/0x17 [ 738.811331][ T1128] should_fail+0x3c0/0x510 [ 738.815584][ T1128] __should_failslab+0x9f/0xe0 23:31:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x8}, 0x20) 23:31:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:12 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3f, 0x8}, 0xc) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000940)='syz0\x00', 0x200002, 0x0) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) openat$cgroup(r4, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000980), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000580)=[{}], 0x8, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000840)={r2}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x9, &(0x7f00000003c0)=@raw=[@exit, @jmp={0x5, 0x0, 0x5, 0xa, 0x0, 0x20, 0x4}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @generic={0xff, 0x1, 0x8}, @map_fd={0x18, 0x1, 0x1, 0x0, r2}], &(0x7f0000000440)='GPL\x00', 0x0, 0x9, &(0x7f0000000480)=""/9, 0x0, 0x13, '\x00', r5, 0x25, r0, 0x8, &(0x7f00000007c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x2, 0x2, 0xb15, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r1, r1, r1, r6, r1]}, 0x80) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r7, 0x58, &(0x7f0000001380)={0x0, 0x0}}, 0x10) openat$cgroup_freezer_state(r7, &(0x7f0000000a40), 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000a80)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r8, 0x6, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={r8, 0x40, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf3}, [@map_fd={0x18, 0x8, 0x1, 0x0, r1}, @alu={0x4, 0x1, 0x6, 0x6, 0x3, 0x20, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='GPL\x00', 0x7fff, 0x90, &(0x7f00000001c0)=""/144, 0x40f00, 0x15, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f0000000280)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xd, 0x6, 0x7fffffff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[r2, 0x1, 0x1]}, 0x80) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 23:31:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0xa}, 0x20) 23:31:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 738.820275][ T1128] should_failslab+0x9/0x20 [ 738.824609][ T1128] kmem_cache_alloc+0x4f/0x2f0 [ 738.829209][ T1128] ? vm_area_dup+0x26/0x1d0 [ 738.833552][ T1128] vm_area_dup+0x26/0x1d0 [ 738.837713][ T1128] dup_mmap+0x6b8/0xea0 [ 738.841707][ T1128] ? __delayed_free_task+0x20/0x20 [ 738.846651][ T1128] ? mm_init+0x807/0x960 [ 738.850731][ T1128] dup_mm+0x91/0x330 [ 738.854641][ T1128] copy_mm+0x108/0x1b0 [ 738.858544][ T1128] copy_process+0x1295/0x3250 [ 738.863059][ T1128] ? proc_fail_nth_write+0x213/0x290 [ 738.868173][ T1128] ? proc_fail_nth_read+0x220/0x220 [ 738.873212][ T1128] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 738.878155][ T1128] ? vfs_write+0x9af/0x1050 [ 738.882494][ T1128] ? vmacache_update+0xb7/0x120 [ 738.887179][ T1128] kernel_clone+0x22d/0x990 [ 738.891521][ T1128] ? file_end_write+0x1b0/0x1b0 [ 738.896206][ T1128] ? __kasan_check_write+0x14/0x20 [ 738.901154][ T1128] ? create_io_thread+0x1e0/0x1e0 [ 738.906020][ T1128] ? __mutex_lock_slowpath+0x10/0x10 [ 738.911135][ T1128] __x64_sys_clone+0x289/0x310 [ 738.915733][ T1128] ? __do_sys_vfork+0x130/0x130 [ 738.920421][ T1128] ? debug_smp_processor_id+0x17/0x20 [ 738.925633][ T1128] do_syscall_64+0x44/0xd0 [ 738.929880][ T1128] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 738.935612][ T1128] RIP: 0033:0x7f14733430a9 [ 738.939862][ T1128] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 738.959311][ T1128] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:12 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 41) 23:31:12 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3f, 0x8}, 0xc) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000940)='syz0\x00', 0x200002, 0x0) (async, rerun: 32) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (rerun: 32) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async, rerun: 32) openat$cgroup(r4, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) (rerun: 32) openat$cgroup_subtree(r3, &(0x7f0000000980), 0x2, 0x0) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000580)=[{}], 0x8, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) (async, rerun: 64) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000840)={r2}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x9, &(0x7f00000003c0)=@raw=[@exit, @jmp={0x5, 0x0, 0x5, 0xa, 0x0, 0x20, 0x4}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @generic={0xff, 0x1, 0x8}, @map_fd={0x18, 0x1, 0x1, 0x0, r2}], &(0x7f0000000440)='GPL\x00', 0x0, 0x9, &(0x7f0000000480)=""/9, 0x0, 0x13, '\x00', r5, 0x25, r0, 0x8, &(0x7f00000007c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x2, 0x2, 0xb15, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r1, r1, r1, r6, r1]}, 0x80) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r7, 0x58, &(0x7f0000001380)={0x0, 0x0}}, 0x10) (rerun: 64) openat$cgroup_freezer_state(r7, &(0x7f0000000a40), 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000a80)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r8, 0x6, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={r8, 0x40, 0x18}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf3}, [@map_fd={0x18, 0x8, 0x1, 0x0, r1}, @alu={0x4, 0x1, 0x6, 0x6, 0x3, 0x20, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='GPL\x00', 0x7fff, 0x90, &(0x7f00000001c0)=""/144, 0x40f00, 0x15, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f0000000280)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xd, 0x6, 0x7fffffff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[r2, 0x1, 0x1]}, 0x80) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 23:31:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x18}, 0x20) 23:31:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:12 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1c, 0x200, 0xfffffa5f, 0x0, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x5, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r5]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x20, 0x2, 0x7, 0x9, 0x0, 0x825, 0x41820, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x10001, 0x6}, 0x98020, 0x100000000, 0x1, 0x7, 0x2, 0x13, 0x59, 0x0, 0xafb, 0x0, 0x100000001}, r0, 0x3, r2, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x3ee}, 0x20) 23:31:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffef7, 0x0, 0x1}, 0x20) 23:31:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:12 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1c, 0x200, 0xfffffa5f, 0x0, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x5, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r5]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x20, 0x2, 0x7, 0x9, 0x0, 0x825, 0x41820, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x10001, 0x6}, 0x98020, 0x100000000, 0x1, 0x7, 0x2, 0x13, 0x59, 0x0, 0xafb, 0x0, 0x100000001}, r0, 0x3, r2, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 738.967549][ T1128] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 738.975363][ T1128] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 738.983171][ T1128] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 738.990983][ T1128] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 738.998795][ T1128] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 739.006609][ T1128] 23:31:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x3f3}, 0x20) [ 739.051252][ T1171] FAULT_INJECTION: forcing a failure. [ 739.051252][ T1171] name failslab, interval 1, probability 0, space 0, times 0 [ 739.076638][ T1171] CPU: 0 PID: 1171 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 739.086628][ T1171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 739.096520][ T1171] Call Trace: [ 739.099646][ T1171] [ 739.102415][ T1171] dump_stack_lvl+0x151/0x1b7 [ 739.106932][ T1171] ? bfq_pos_tree_add_move+0x43e/0x43e [ 739.112234][ T1171] dump_stack+0x15/0x17 [ 739.116218][ T1171] should_fail+0x3c0/0x510 [ 739.120472][ T1171] __should_failslab+0x9f/0xe0 [ 739.125069][ T1171] should_failslab+0x9/0x20 [ 739.129410][ T1171] kmem_cache_alloc+0x4f/0x2f0 [ 739.134011][ T1171] ? vm_area_dup+0x26/0x1d0 [ 739.138348][ T1171] vm_area_dup+0x26/0x1d0 [ 739.142517][ T1171] dup_mmap+0x6b8/0xea0 [ 739.146511][ T1171] ? __delayed_free_task+0x20/0x20 [ 739.151453][ T1171] ? mm_init+0x807/0x960 [ 739.155536][ T1171] dup_mm+0x91/0x330 [ 739.159267][ T1171] copy_mm+0x108/0x1b0 [ 739.163171][ T1171] copy_process+0x1295/0x3250 [ 739.167685][ T1171] ? proc_fail_nth_write+0x213/0x290 [ 739.172807][ T1171] ? proc_fail_nth_read+0x220/0x220 [ 739.177841][ T1171] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 739.182797][ T1171] ? vfs_write+0x9af/0x1050 [ 739.187127][ T1171] ? vmacache_update+0xb7/0x120 [ 739.191816][ T1171] kernel_clone+0x22d/0x990 [ 739.196154][ T1171] ? file_end_write+0x1b0/0x1b0 [ 739.200839][ T1171] ? __kasan_check_write+0x14/0x20 [ 739.205795][ T1171] ? create_io_thread+0x1e0/0x1e0 [ 739.210735][ T1171] ? __mutex_lock_slowpath+0x10/0x10 [ 739.215858][ T1171] __x64_sys_clone+0x289/0x310 [ 739.220473][ T1171] ? __do_sys_vfork+0x130/0x130 [ 739.225145][ T1171] ? debug_smp_processor_id+0x17/0x20 [ 739.230350][ T1171] do_syscall_64+0x44/0xd0 [ 739.234605][ T1171] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 739.240332][ T1171] RIP: 0033:0x7f14733430a9 [ 739.244585][ T1171] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 739.264027][ T1171] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 739.272276][ T1171] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 739.280085][ T1171] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 739.287893][ T1171] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:12 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 42) 23:31:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffef7}, 0x20) 23:31:12 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3f, 0x8}, 0xc) (async) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) (async) r3 = openat$cgroup(r2, &(0x7f0000000940)='syz0\x00', 0x200002, 0x0) (async, rerun: 64) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (rerun: 64) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) openat$cgroup(r4, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) (async) openat$cgroup_subtree(r3, &(0x7f0000000980), 0x2, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000580)=[{}], 0x8, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) (async) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000840)={r2}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x9, &(0x7f00000003c0)=@raw=[@exit, @jmp={0x5, 0x0, 0x5, 0xa, 0x0, 0x20, 0x4}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @generic={0xff, 0x1, 0x8}, @map_fd={0x18, 0x1, 0x1, 0x0, r2}], &(0x7f0000000440)='GPL\x00', 0x0, 0x9, &(0x7f0000000480)=""/9, 0x0, 0x13, '\x00', r5, 0x25, r0, 0x8, &(0x7f00000007c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x2, 0x2, 0xb15, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r1, r1, r1, r6, r1]}, 0x80) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r7, 0x58, &(0x7f0000001380)={0x0, 0x0}}, 0x10) (async, rerun: 64) openat$cgroup_freezer_state(r7, &(0x7f0000000a40), 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000a80)='cgroup.threads\x00', 0x2, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r8, 0x6, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={r8, 0x40, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf3}, [@map_fd={0x18, 0x8, 0x1, 0x0, r1}, @alu={0x4, 0x1, 0x6, 0x6, 0x3, 0x20, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='GPL\x00', 0x7fff, 0x90, &(0x7f00000001c0)=""/144, 0x40f00, 0x15, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f0000000280)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xd, 0x6, 0x7fffffff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[r2, 0x1, 0x1]}, 0x80) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 23:31:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x3f5}, 0x20) 23:31:12 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1c, 0x200, 0xfffffa5f, 0x0, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x5, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r5]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x20, 0x2, 0x7, 0x9, 0x0, 0x825, 0x41820, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x10001, 0x6}, 0x98020, 0x100000000, 0x1, 0x7, 0x2, 0x13, 0x59, 0x0, 0xafb, 0x0, 0x100000001}, r0, 0x3, r2, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x3f6}, 0x20) 23:31:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) [ 739.295706][ T1171] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 739.303521][ T1171] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 739.311329][ T1171] 23:31:12 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) openat$cgroup_type(r0, &(0x7f00000001c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:12 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1c, 0x200, 0xfffffa5f, 0x0, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x5, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r5]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x20, 0x2, 0x7, 0x9, 0x0, 0x825, 0x41820, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x10001, 0x6}, 0x98020, 0x100000000, 0x1, 0x7, 0x2, 0x13, 0x59, 0x0, 0xafb, 0x0, 0x100000001}, r0, 0x3, r2, 0x8) [ 739.356232][ T1199] FAULT_INJECTION: forcing a failure. [ 739.356232][ T1199] name failslab, interval 1, probability 0, space 0, times 0 [ 739.393583][ T1199] CPU: 0 PID: 1199 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 739.403569][ T1199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 739.413463][ T1199] Call Trace: [ 739.416588][ T1199] [ 739.419365][ T1199] dump_stack_lvl+0x151/0x1b7 [ 739.423883][ T1199] ? bfq_pos_tree_add_move+0x43e/0x43e [ 739.429174][ T1199] dump_stack+0x15/0x17 [ 739.433164][ T1199] should_fail+0x3c0/0x510 [ 739.437419][ T1199] __should_failslab+0x9f/0xe0 [ 739.442016][ T1199] should_failslab+0x9/0x20 [ 739.446357][ T1199] kmem_cache_alloc+0x4f/0x2f0 [ 739.450967][ T1199] ? vm_area_dup+0x26/0x1d0 [ 739.455298][ T1199] ? __kasan_check_read+0x11/0x20 [ 739.460160][ T1199] vm_area_dup+0x26/0x1d0 [ 739.464323][ T1199] dup_mmap+0x6b8/0xea0 [ 739.468320][ T1199] ? __delayed_free_task+0x20/0x20 [ 739.473266][ T1199] ? mm_init+0x807/0x960 [ 739.477343][ T1199] dup_mm+0x91/0x330 [ 739.481077][ T1199] copy_mm+0x108/0x1b0 [ 739.484977][ T1199] copy_process+0x1295/0x3250 [ 739.489495][ T1199] ? proc_fail_nth_write+0x213/0x290 [ 739.494610][ T1199] ? proc_fail_nth_read+0x220/0x220 [ 739.499651][ T1199] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 739.504591][ T1199] ? vfs_write+0x9af/0x1050 [ 739.508930][ T1199] ? vmacache_update+0xb7/0x120 [ 739.513618][ T1199] kernel_clone+0x22d/0x990 [ 739.517964][ T1199] ? file_end_write+0x1b0/0x1b0 [ 739.522651][ T1199] ? __kasan_check_write+0x14/0x20 [ 739.527589][ T1199] ? create_io_thread+0x1e0/0x1e0 [ 739.532449][ T1199] ? __mutex_lock_slowpath+0x10/0x10 [ 739.537572][ T1199] __x64_sys_clone+0x289/0x310 [ 739.542173][ T1199] ? __do_sys_vfork+0x130/0x130 [ 739.546860][ T1199] ? debug_smp_processor_id+0x17/0x20 [ 739.552067][ T1199] do_syscall_64+0x44/0xd0 [ 739.556318][ T1199] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 739.562049][ T1199] RIP: 0033:0x7f14733430a9 [ 739.566300][ T1199] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 739.585746][ T1199] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 739.593988][ T1199] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:13 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 43) 23:31:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x25) 23:31:13 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1c, 0x200, 0xfffffa5f, 0x0, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x5, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r5]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) 23:31:13 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) openat$cgroup_type(r0, &(0x7f00000001c0), 0x2, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) [ 739.601801][ T1199] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 739.609696][ T1199] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 739.617508][ T1199] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 739.625337][ T1199] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 739.633134][ T1199] [ 739.651998][ T1213] FAULT_INJECTION: forcing a failure. 23:31:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x200001a0) 23:31:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:13 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) openat$cgroup_type(r0, &(0x7f00000001c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 739.651998][ T1213] name failslab, interval 1, probability 0, space 0, times 0 [ 739.692841][ T1213] CPU: 0 PID: 1213 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 23:31:13 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1c, 0x200, 0xfffffa5f, 0x0, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x5, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r5]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) 23:31:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 739.702827][ T1213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 739.712722][ T1213] Call Trace: [ 739.715851][ T1213] [ 739.718624][ T1213] dump_stack_lvl+0x151/0x1b7 [ 739.723139][ T1213] ? bfq_pos_tree_add_move+0x43e/0x43e [ 739.728436][ T1213] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 739.734683][ T1213] dump_stack+0x15/0x17 [ 739.738679][ T1213] should_fail+0x3c0/0x510 [ 739.742931][ T1213] __should_failslab+0x9f/0xe0 [ 739.747533][ T1213] should_failslab+0x9/0x20 [ 739.752137][ T1213] kmem_cache_alloc+0x4f/0x2f0 [ 739.756732][ T1213] ? anon_vma_fork+0xf7/0x4f0 [ 739.761260][ T1213] anon_vma_fork+0xf7/0x4f0 [ 739.765589][ T1213] ? anon_vma_name+0x4c/0x70 [ 739.770092][ T1213] dup_mmap+0x750/0xea0 [ 739.774083][ T1213] ? __delayed_free_task+0x20/0x20 [ 739.779031][ T1213] ? mm_init+0x807/0x960 [ 739.783200][ T1213] dup_mm+0x91/0x330 [ 739.786927][ T1213] copy_mm+0x108/0x1b0 [ 739.790832][ T1213] copy_process+0x1295/0x3250 [ 739.795346][ T1213] ? proc_fail_nth_write+0x213/0x290 [ 739.800469][ T1213] ? proc_fail_nth_read+0x220/0x220 [ 739.805511][ T1213] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 739.810447][ T1213] ? vfs_write+0x9af/0x1050 [ 739.814787][ T1213] ? vmacache_update+0xb7/0x120 [ 739.819481][ T1213] kernel_clone+0x22d/0x990 [ 739.823816][ T1213] ? file_end_write+0x1b0/0x1b0 [ 739.828500][ T1213] ? __kasan_check_write+0x14/0x20 [ 739.833448][ T1213] ? create_io_thread+0x1e0/0x1e0 [ 739.838309][ T1213] ? __mutex_lock_slowpath+0x10/0x10 [ 739.843431][ T1213] __x64_sys_clone+0x289/0x310 [ 739.848034][ T1213] ? __do_sys_vfork+0x130/0x130 [ 739.852718][ T1213] ? debug_smp_processor_id+0x17/0x20 [ 739.857923][ T1213] do_syscall_64+0x44/0xd0 [ 739.862180][ T1213] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 739.867908][ T1213] RIP: 0033:0x7f14733430a9 [ 739.872160][ T1213] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 739.891600][ T1213] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 739.899844][ T1213] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:13 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 44) 23:31:13 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1c, 0x200, 0xfffffa5f, 0x0, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x5, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r5]}, 0x80) 23:31:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:13 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x10001) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/149, 0x5c, 0x95, 0x1}, 0x20) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x1, 0x400, 0x0, 0x28, 0x1, 0x7, '\x00', 0x0, r1, 0x1, 0x3, 0x4, 0xd}, 0x48) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x0, 0x8, 0x7ff, 0x18c8, 0x1, 0x35, '\x00', 0x0, r1, 0x3, 0x1, 0x1, 0xe}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @ldst={0x0, 0x1, 0x6, 0x9, 0x3, 0x30, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, @alu={0x4, 0x0, 0x7, 0x3, 0x7, 0x80, 0x1}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xe}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0xa, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r5, 0xffffffffffffffff, r6]}, 0x80) [ 739.907656][ T1213] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 739.915474][ T1213] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 739.923282][ T1213] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 739.931095][ T1213] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 739.938904][ T1213] 23:31:13 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b8100000000183a000000000000000000000000000018350000000000000000868f38ac496cd853e2d6a275000000000000181400"/80, @ANYRES32, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x6, 0x668a, 0xbd7, 0x8, 0x1100, 0x1, 0x531db644, '\x00', 0x0, r2, 0x3, 0x4, 0x3}, 0x48) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) recvmsg$unix(r2, &(0x7f0000000680)={&(0x7f0000000500), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000580)=""/53, 0x35}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/1, 0x1}, {&(0x7f00000033c0)=""/4096, 0x1000}], 0x4, &(0x7f0000000640)=[@cred={{0x1c}}], 0x20}, 0x10010) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x1d8, 0x800, 0x3, 0x110, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x5, 0x3, 0xd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x401, 0x7, 0x7fffffff, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x2, 0x0, 0x4}, 0x48) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffff8}, @alu={0x4, 0x0, 0x2, 0x6, 0x5, 0x97, 0xffffffffffffffff}, @generic={0xfe, 0x5, 0x5, 0x1ff, 0x100}]}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0x3a, &(0x7f0000000140)=""/58, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x0, 0x1f, 0xfffff001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0x1, r5, r6]}, 0x80) [ 739.966270][ T1243] FAULT_INJECTION: forcing a failure. [ 739.966270][ T1243] name failslab, interval 1, probability 0, space 0, times 0 [ 739.983736][ T1243] CPU: 1 PID: 1243 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 739.993720][ T1243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 740.003613][ T1243] Call Trace: [ 740.006736][ T1243] [ 740.009513][ T1243] dump_stack_lvl+0x151/0x1b7 [ 740.014043][ T1243] ? bfq_pos_tree_add_move+0x43e/0x43e [ 740.019320][ T1243] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 740.025570][ T1243] dump_stack+0x15/0x17 [ 740.029563][ T1243] should_fail+0x3c0/0x510 [ 740.033816][ T1243] __should_failslab+0x9f/0xe0 [ 740.038417][ T1243] should_failslab+0x9/0x20 [ 740.042756][ T1243] kmem_cache_alloc+0x4f/0x2f0 [ 740.047353][ T1243] ? anon_vma_fork+0xf7/0x4f0 [ 740.051868][ T1243] anon_vma_fork+0xf7/0x4f0 [ 740.056210][ T1243] ? anon_vma_name+0x4c/0x70 [ 740.060636][ T1243] dup_mmap+0x750/0xea0 [ 740.064627][ T1243] ? __delayed_free_task+0x20/0x20 [ 740.069576][ T1243] ? mm_init+0x807/0x960 [ 740.073653][ T1243] dup_mm+0x91/0x330 [ 740.077388][ T1243] copy_mm+0x108/0x1b0 [ 740.081290][ T1243] copy_process+0x1295/0x3250 [ 740.085803][ T1243] ? proc_fail_nth_write+0x213/0x290 [ 740.090927][ T1243] ? proc_fail_nth_read+0x220/0x220 [ 740.095961][ T1243] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 740.100906][ T1243] ? vfs_write+0x9af/0x1050 [ 740.105244][ T1243] ? vmacache_update+0xb7/0x120 [ 740.109935][ T1243] kernel_clone+0x22d/0x990 [ 740.114367][ T1243] ? file_end_write+0x1b0/0x1b0 [ 740.119055][ T1243] ? __kasan_check_write+0x14/0x20 [ 740.124004][ T1243] ? create_io_thread+0x1e0/0x1e0 [ 740.128863][ T1243] ? __mutex_lock_slowpath+0x10/0x10 [ 740.133986][ T1243] __x64_sys_clone+0x289/0x310 [ 740.138584][ T1243] ? __do_sys_vfork+0x130/0x130 [ 740.143274][ T1243] ? debug_smp_processor_id+0x17/0x20 [ 740.148478][ T1243] do_syscall_64+0x44/0xd0 [ 740.152732][ T1243] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 740.158458][ T1243] RIP: 0033:0x7f14733430a9 [ 740.162715][ T1243] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 740.182153][ T1243] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 740.190398][ T1243] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 740.198209][ T1243] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 740.206021][ T1243] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.213832][ T1243] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 740.221644][ T1243] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 740.229459][ T1243] 23:31:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:13 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b8100000000183a000000000000000000000000000018350000000000000000868f38ac496cd853e2d6a275000000000000181400"/80, @ANYRES32, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x6, 0x668a, 0xbd7, 0x8, 0x1100, 0x1, 0x531db644, '\x00', 0x0, r2, 0x3, 0x4, 0x3}, 0x48) (async) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000680)={&(0x7f0000000500), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000580)=""/53, 0x35}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/1, 0x1}, {&(0x7f00000033c0)=""/4096, 0x1000}], 0x4, &(0x7f0000000640)=[@cred={{0x1c}}], 0x20}, 0x10010) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x1d8, 0x800, 0x3, 0x110, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x5, 0x3, 0xd}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x401, 0x7, 0x7fffffff, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x2, 0x0, 0x4}, 0x48) (async) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffff8}, @alu={0x4, 0x0, 0x2, 0x6, 0x5, 0x97, 0xffffffffffffffff}, @generic={0xfe, 0x5, 0x5, 0x1ff, 0x100}]}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0x3a, &(0x7f0000000140)=""/58, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x0, 0x1f, 0xfffff001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0x1, r5, r6]}, 0x80) 23:31:13 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:13 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x10001) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/149, 0x5c, 0x95, 0x1}, 0x20) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x1, 0x400, 0x0, 0x28, 0x1, 0x7, '\x00', 0x0, r1, 0x1, 0x3, 0x4, 0xd}, 0x48) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x0, 0x8, 0x7ff, 0x18c8, 0x1, 0x35, '\x00', 0x0, r1, 0x3, 0x1, 0x1, 0xe}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @ldst={0x0, 0x1, 0x6, 0x9, 0x3, 0x30, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, @alu={0x4, 0x0, 0x7, 0x3, 0x7, 0x80, 0x1}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xe}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0xa, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r5, 0xffffffffffffffff, r6]}, 0x80) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x10001) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/149, 0x5c, 0x95, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x1, 0x400, 0x0, 0x28, 0x1, 0x7, '\x00', 0x0, r1, 0x1, 0x3, 0x4, 0xd}, 0x48) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x0, 0x8, 0x7ff, 0x18c8, 0x1, 0x35, '\x00', 0x0, r1, 0x3, 0x1, 0x1, 0xe}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @ldst={0x0, 0x1, 0x6, 0x9, 0x3, 0x30, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, @alu={0x4, 0x0, 0x7, 0x3, 0x7, 0x80, 0x1}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xe}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0xa, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r5, 0xffffffffffffffff, r6]}, 0x80) (async) 23:31:13 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 45) 23:31:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:13 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b8100000000183a000000000000000000000000000018350000000000000000868f38ac496cd853e2d6a275000000000000181400"/80, @ANYRES32, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x6, 0x668a, 0xbd7, 0x8, 0x1100, 0x1, 0x531db644, '\x00', 0x0, r2, 0x3, 0x4, 0x3}, 0x48) (async) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000680)={&(0x7f0000000500), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000580)=""/53, 0x35}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/1, 0x1}, {&(0x7f00000033c0)=""/4096, 0x1000}], 0x4, &(0x7f0000000640)=[@cred={{0x1c}}], 0x20}, 0x10010) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x1d8, 0x800, 0x3, 0x110, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x5, 0x3, 0xd}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x401, 0x7, 0x7fffffff, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x2, 0x0, 0x4}, 0x48) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffff8}, @alu={0x4, 0x0, 0x2, 0x6, 0x5, 0x97, 0xffffffffffffffff}, @generic={0xfe, 0x5, 0x5, 0x1ff, 0x100}]}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0x3a, &(0x7f0000000140)=""/58, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x0, 0x1f, 0xfffff001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0x1, r5, r6]}, 0x80) 23:31:13 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:13 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) close(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r1, 0x20, &(0x7f0000000340)={&(0x7f00000001c0)=""/154, 0x9a, 0x0, &(0x7f0000000280)=""/171, 0xab}}, 0x10) 23:31:13 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) [ 740.299573][ T1264] FAULT_INJECTION: forcing a failure. [ 740.299573][ T1264] name failslab, interval 1, probability 0, space 0, times 0 [ 740.336853][ T1264] CPU: 0 PID: 1264 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 740.346980][ T1264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 740.356873][ T1264] Call Trace: [ 740.360000][ T1264] [ 740.362773][ T1264] dump_stack_lvl+0x151/0x1b7 [ 740.367291][ T1264] ? bfq_pos_tree_add_move+0x43e/0x43e [ 740.372585][ T1264] dump_stack+0x15/0x17 [ 740.376576][ T1264] should_fail+0x3c0/0x510 [ 740.380830][ T1264] __should_failslab+0x9f/0xe0 [ 740.385429][ T1264] should_failslab+0x9/0x20 [ 740.389765][ T1264] kmem_cache_alloc+0x4f/0x2f0 [ 740.394366][ T1264] ? anon_vma_fork+0x1b9/0x4f0 23:31:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:13 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) close(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r1, 0x20, &(0x7f0000000340)={&(0x7f00000001c0)=""/154, 0x9a, 0x0, &(0x7f0000000280)=""/171, 0xab}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) (async) close(r0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r1, 0x20, &(0x7f0000000340)={&(0x7f00000001c0)=""/154, 0x9a, 0x0, &(0x7f0000000280)=""/171, 0xab}}, 0x10) (async) 23:31:13 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) [ 740.398966][ T1264] anon_vma_fork+0x1b9/0x4f0 [ 740.403396][ T1264] dup_mmap+0x750/0xea0 [ 740.407387][ T1264] ? __delayed_free_task+0x20/0x20 [ 740.412335][ T1264] ? mm_init+0x807/0x960 [ 740.416414][ T1264] dup_mm+0x91/0x330 [ 740.420143][ T1264] copy_mm+0x108/0x1b0 [ 740.424049][ T1264] copy_process+0x1295/0x3250 [ 740.428564][ T1264] ? proc_fail_nth_write+0x213/0x290 [ 740.433686][ T1264] ? proc_fail_nth_read+0x220/0x220 [ 740.438727][ T1264] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 740.443664][ T1264] ? vfs_write+0x9af/0x1050 [ 740.448008][ T1264] ? vmacache_update+0xb7/0x120 [ 740.452718][ T1264] kernel_clone+0x22d/0x990 [ 740.457033][ T1264] ? file_end_write+0x1b0/0x1b0 [ 740.461717][ T1264] ? __kasan_check_write+0x14/0x20 [ 740.466753][ T1264] ? create_io_thread+0x1e0/0x1e0 [ 740.471612][ T1264] ? __mutex_lock_slowpath+0x10/0x10 [ 740.476736][ T1264] __x64_sys_clone+0x289/0x310 [ 740.481334][ T1264] ? __do_sys_vfork+0x130/0x130 [ 740.486024][ T1264] ? debug_smp_processor_id+0x17/0x20 [ 740.491228][ T1264] do_syscall_64+0x44/0xd0 [ 740.495481][ T1264] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 740.501204][ T1264] RIP: 0033:0x7f14733430a9 [ 740.505456][ T1264] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 740.524902][ T1264] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 740.533148][ T1264] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 740.540956][ T1264] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:14 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x10001) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/149, 0x5c, 0x95, 0x1}, 0x20) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x1, 0x400, 0x0, 0x28, 0x1, 0x7, '\x00', 0x0, r1, 0x1, 0x3, 0x4, 0xd}, 0x48) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x0, 0x8, 0x7ff, 0x18c8, 0x1, 0x35, '\x00', 0x0, r1, 0x3, 0x1, 0x1, 0xe}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @ldst={0x0, 0x1, 0x6, 0x9, 0x3, 0x30, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, @alu={0x4, 0x0, 0x7, 0x3, 0x7, 0x80, 0x1}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xe}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0xa, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r3, r5, 0xffffffffffffffff, r6]}, 0x80) 23:31:14 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 46) 23:31:14 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) close(r0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r1, 0x20, &(0x7f0000000340)={&(0x7f00000001c0)=""/154, 0x9a, 0x0, &(0x7f0000000280)=""/171, 0xab}}, 0x10) 23:31:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:14 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:14 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r1, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r1, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r5}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r6}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r6, r6]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x18, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x10000}}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x200002, 0x5, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) openat$cgroup_ro(r1, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r1, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r0, r2, 0x25, 0x10}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r7, 0x20, &(0x7f0000000140)={&(0x7f0000000000)=""/28, 0x1c, 0x0, &(0x7f0000000040)=""/35, 0x23}}, 0x10) [ 740.548771][ T1264] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.556577][ T1264] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 740.564389][ T1264] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 740.572206][ T1264] [ 740.604908][ T1319] FAULT_INJECTION: forcing a failure. [ 740.604908][ T1319] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 740.619211][ T1319] CPU: 1 PID: 1319 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 740.629207][ T1319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 740.639097][ T1319] Call Trace: [ 740.642215][ T1319] [ 740.645079][ T1319] dump_stack_lvl+0x151/0x1b7 [ 740.649685][ T1319] ? bfq_pos_tree_add_move+0x43e/0x43e 23:31:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xab, 0xab, 0xa, [@datasec={0x3, 0x7, 0x0, 0xf, 0x3, [{0x2, 0x2, 0xffffffff}, {0x3, 0x4, 0x8}, {0x4, 0x1, 0x3}, {0x5, 0x5, 0x20}, {0x5, 0x6d60f861, 0x9}, {0x5, 0x66a5, 0x1000}, {0x2, 0xfffffffe, 0x23}], "e957f6"}, @struct={0x2, 0x4, 0x0, 0x4, 0x0, 0x20, [{0x0, 0x3, 0x2}, {0xf, 0x0, 0x8}, {0xa, 0x4}, {0x1, 0x5}]}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x5f, 0x61, 0x61, 0x0, 0x30, 0x30, 0x5f, 0x0]}}, &(0x7f00000002c0)=""/202, 0xce, 0xca, 0x1}, 0x20) 23:31:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:14 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) [ 740.655074][ T1319] ? stack_trace_save+0x1f0/0x1f0 [ 740.659925][ T1319] ? __kernel_text_address+0x9a/0x110 [ 740.665138][ T1319] dump_stack+0x15/0x17 [ 740.669311][ T1319] should_fail+0x3c0/0x510 [ 740.673567][ T1319] should_fail_alloc_page+0x58/0x70 [ 740.678592][ T1319] __alloc_pages+0x1de/0x7c0 [ 740.683024][ T1319] ? stack_trace_save+0x12d/0x1f0 [ 740.687884][ T1319] ? stack_trace_snprint+0x100/0x100 [ 740.693016][ T1319] ? __count_vm_events+0x30/0x30 [ 740.697779][ T1319] ? __kasan_slab_alloc+0xc4/0xe0 [ 740.702636][ T1319] ? __kasan_slab_alloc+0xb2/0xe0 [ 740.707497][ T1319] ? kmem_cache_alloc+0x189/0x2f0 [ 740.712358][ T1319] ? anon_vma_fork+0x1b9/0x4f0 [ 740.716962][ T1319] get_zeroed_page+0x19/0x40 [ 740.721384][ T1319] __pud_alloc+0x8b/0x260 [ 740.725563][ T1319] ? do_handle_mm_fault+0x2370/0x2370 [ 740.730763][ T1319] copy_page_range+0xd9e/0x1090 [ 740.735453][ T1319] ? pfn_valid+0x1e0/0x1e0 [ 740.739702][ T1319] dup_mmap+0x99f/0xea0 [ 740.743693][ T1319] ? __delayed_free_task+0x20/0x20 [ 740.748645][ T1319] ? mm_init+0x807/0x960 [ 740.752720][ T1319] dup_mm+0x91/0x330 [ 740.756468][ T1319] copy_mm+0x108/0x1b0 [ 740.760356][ T1319] copy_process+0x1295/0x3250 [ 740.764874][ T1319] ? proc_fail_nth_write+0x213/0x290 [ 740.769992][ T1319] ? proc_fail_nth_read+0x220/0x220 [ 740.775033][ T1319] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 740.779970][ T1319] ? vfs_write+0x9af/0x1050 [ 740.784312][ T1319] ? vmacache_update+0xb7/0x120 [ 740.788996][ T1319] kernel_clone+0x22d/0x990 [ 740.793334][ T1319] ? file_end_write+0x1b0/0x1b0 [ 740.798021][ T1319] ? __kasan_check_write+0x14/0x20 [ 740.802967][ T1319] ? create_io_thread+0x1e0/0x1e0 [ 740.807832][ T1319] ? __mutex_lock_slowpath+0x10/0x10 [ 740.812946][ T1319] __x64_sys_clone+0x289/0x310 [ 740.817547][ T1319] ? __do_sys_vfork+0x130/0x130 [ 740.822238][ T1319] ? debug_smp_processor_id+0x17/0x20 [ 740.827440][ T1319] do_syscall_64+0x44/0xd0 [ 740.831695][ T1319] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 740.837422][ T1319] RIP: 0033:0x7f14733430a9 [ 740.841678][ T1319] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 740.861134][ T1319] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 740.869362][ T1319] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 740.877176][ T1319] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 740.884986][ T1319] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.892802][ T1319] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:14 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 47) 23:31:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:14 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:14 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r1, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r1, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r5}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r6}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r6, r6]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x18, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x10000}}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x200002, 0x5, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) openat$cgroup_ro(r1, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r1, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r0, r2, 0x25, 0x10}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r7, 0x20, &(0x7f0000000140)={&(0x7f0000000000)=""/28, 0x1c, 0x0, &(0x7f0000000040)=""/35, 0x23}}, 0x10) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) (async) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r1, 0x58, &(0x7f0000001380)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1]}, 0x80) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r1, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r5}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r6}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r6, r6]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x18, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x10000}}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x200002, 0x5, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) (async) openat$cgroup_ro(r1, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r1, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r0, r2, 0x25, 0x10}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r7, 0x20, &(0x7f0000000140)={&(0x7f0000000000)=""/28, 0x1c, 0x0, &(0x7f0000000040)=""/35, 0x23}}, 0x10) (async) 23:31:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xab, 0xab, 0xa, [@datasec={0x3, 0x7, 0x0, 0xf, 0x3, [{0x2, 0x2, 0xffffffff}, {0x3, 0x4, 0x8}, {0x4, 0x1, 0x3}, {0x5, 0x5, 0x20}, {0x5, 0x6d60f861, 0x9}, {0x5, 0x66a5, 0x1000}, {0x2, 0xfffffffe, 0x23}], "e957f6"}, @struct={0x2, 0x4, 0x0, 0x4, 0x0, 0x20, [{0x0, 0x3, 0x2}, {0xf, 0x0, 0x8}, {0xa, 0x4}, {0x1, 0x5}]}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x5f, 0x61, 0x61, 0x0, 0x30, 0x30, 0x5f, 0x0]}}, &(0x7f00000002c0)=""/202, 0xce, 0xca, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xab, 0xab, 0xa, [@datasec={0x3, 0x7, 0x0, 0xf, 0x3, [{0x2, 0x2, 0xffffffff}, {0x3, 0x4, 0x8}, {0x4, 0x1, 0x3}, {0x5, 0x5, 0x20}, {0x5, 0x6d60f861, 0x9}, {0x5, 0x66a5, 0x1000}, {0x2, 0xfffffffe, 0x23}], "e957f6"}, @struct={0x2, 0x4, 0x0, 0x4, 0x0, 0x20, [{0x0, 0x3, 0x2}, {0xf, 0x0, 0x8}, {0xa, 0x4}, {0x1, 0x5}]}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x5f, 0x61, 0x61, 0x0, 0x30, 0x30, 0x5f, 0x0]}}, &(0x7f00000002c0)=""/202, 0xce, 0xca, 0x1}, 0x20) (async) 23:31:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 740.900608][ T1319] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 740.908422][ T1319] [ 740.925602][ T1341] FAULT_INJECTION: forcing a failure. [ 740.925602][ T1341] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:31:14 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r1, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1]}, 0x80) (async) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r1, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r5}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r6}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r6, r6]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x18, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x10000}}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x200002, 0x5, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) openat$cgroup_ro(r1, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r1, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r0, r2, 0x25, 0x10}, 0x10) (async) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r7, 0x20, &(0x7f0000000140)={&(0x7f0000000000)=""/28, 0x1c, 0x0, &(0x7f0000000040)=""/35, 0x23}}, 0x10) 23:31:14 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xab, 0xab, 0xa, [@datasec={0x3, 0x7, 0x0, 0xf, 0x3, [{0x2, 0x2, 0xffffffff}, {0x3, 0x4, 0x8}, {0x4, 0x1, 0x3}, {0x5, 0x5, 0x20}, {0x5, 0x6d60f861, 0x9}, {0x5, 0x66a5, 0x1000}, {0x2, 0xfffffffe, 0x23}], "e957f6"}, @struct={0x2, 0x4, 0x0, 0x4, 0x0, 0x20, [{0x0, 0x3, 0x2}, {0xf, 0x0, 0x8}, {0xa, 0x4}, {0x1, 0x5}]}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x5f, 0x61, 0x61, 0x0, 0x30, 0x30, 0x5f, 0x0]}}, &(0x7f00000002c0)=""/202, 0xce, 0xca, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xab, 0xab, 0xa, [@datasec={0x3, 0x7, 0x0, 0xf, 0x3, [{0x2, 0x2, 0xffffffff}, {0x3, 0x4, 0x8}, {0x4, 0x1, 0x3}, {0x5, 0x5, 0x20}, {0x5, 0x6d60f861, 0x9}, {0x5, 0x66a5, 0x1000}, {0x2, 0xfffffffe, 0x23}], "e957f6"}, @struct={0x2, 0x4, 0x0, 0x4, 0x0, 0x20, [{0x0, 0x3, 0x2}, {0xf, 0x0, 0x8}, {0xa, 0x4}, {0x1, 0x5}]}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x5f, 0x61, 0x61, 0x0, 0x30, 0x30, 0x5f, 0x0]}}, &(0x7f00000002c0)=""/202, 0xce, 0xca, 0x1}, 0x20) (async) 23:31:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018", @ANYRES32], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 740.954461][ T1341] CPU: 1 PID: 1341 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 740.964463][ T1341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 740.974349][ T1341] Call Trace: [ 740.977474][ T1341] [ 740.980289][ T1341] dump_stack_lvl+0x151/0x1b7 [ 740.984769][ T1341] ? bfq_pos_tree_add_move+0x43e/0x43e [ 740.990059][ T1341] ? __kasan_check_write+0x14/0x20 [ 740.995007][ T1341] ? __set_page_owner+0x2ee/0x310 [ 740.999869][ T1341] dump_stack+0x15/0x17 23:31:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018", @ANYRES32], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018", @ANYRES32], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async) [ 741.003868][ T1341] should_fail+0x3c0/0x510 [ 741.008116][ T1341] should_fail_alloc_page+0x58/0x70 [ 741.013144][ T1341] __alloc_pages+0x1de/0x7c0 [ 741.017577][ T1341] ? __count_vm_events+0x30/0x30 [ 741.022779][ T1341] ? __count_vm_events+0x30/0x30 [ 741.027554][ T1341] ? __kasan_check_write+0x14/0x20 [ 741.032500][ T1341] ? _raw_spin_lock+0xa3/0x1b0 [ 741.037099][ T1341] __pmd_alloc+0xb1/0x550 [ 741.041265][ T1341] ? kmem_cache_alloc+0x189/0x2f0 [ 741.046121][ T1341] ? anon_vma_fork+0x1b9/0x4f0 [ 741.050728][ T1341] ? __pud_alloc+0x260/0x260 [ 741.055154][ T1341] ? __pud_alloc+0x218/0x260 [ 741.059583][ T1341] ? do_handle_mm_fault+0x2370/0x2370 [ 741.064796][ T1341] copy_page_range+0xd04/0x1090 [ 741.069478][ T1341] ? pfn_valid+0x1e0/0x1e0 [ 741.073820][ T1341] dup_mmap+0x99f/0xea0 [ 741.077810][ T1341] ? __delayed_free_task+0x20/0x20 [ 741.082755][ T1341] ? mm_init+0x807/0x960 [ 741.086831][ T1341] dup_mm+0x91/0x330 [ 741.090563][ T1341] copy_mm+0x108/0x1b0 [ 741.094470][ T1341] copy_process+0x1295/0x3250 [ 741.098984][ T1341] ? proc_fail_nth_write+0x213/0x290 [ 741.104101][ T1341] ? proc_fail_nth_read+0x220/0x220 [ 741.109137][ T1341] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 741.114080][ T1341] ? vfs_write+0x9af/0x1050 [ 741.118420][ T1341] ? vmacache_update+0xb7/0x120 [ 741.123105][ T1341] kernel_clone+0x22d/0x990 [ 741.127444][ T1341] ? file_end_write+0x1b0/0x1b0 [ 741.132133][ T1341] ? __kasan_check_write+0x14/0x20 [ 741.137079][ T1341] ? create_io_thread+0x1e0/0x1e0 [ 741.141938][ T1341] ? __mutex_lock_slowpath+0x10/0x10 [ 741.147065][ T1341] __x64_sys_clone+0x289/0x310 [ 741.151667][ T1341] ? __do_sys_vfork+0x130/0x130 [ 741.156364][ T1341] ? debug_smp_processor_id+0x17/0x20 [ 741.161557][ T1341] do_syscall_64+0x44/0xd0 [ 741.165808][ T1341] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 741.171537][ T1341] RIP: 0033:0x7f14733430a9 [ 741.175876][ T1341] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 741.195318][ T1341] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:14 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 48) 23:31:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r2, r2, r2, r3]}, 0x80) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x99f79f7719dc7cb}, 0x10) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="9500000000000000185300000dce69c7acd4925bf200000020b5050000080000d0034418", @ANYRES32=r0, @ANYBLOB="00000000000000008500000061000000"], &(0x7f00000001c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000200)=""/227, 0x40f00, 0x12, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x200, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x4, 0x3, 0xf439}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r2, r4, r5]}, 0x80) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f00000005c0), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000600)={[{0x2b, 'cpuacct'}, {0x2b, 'perf_event'}, {0x2b, 'rlimit'}, {0x2b, 'pids'}, {0x2b, 'net_cls'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2d, 'pids'}, {0x0, 'cpuacct'}]}, 0x4b) ioctl$TUNGETVNETLE(r6, 0x800454dd, &(0x7f00000004c0)) 23:31:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018", @ANYRES32], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async, rerun: 32) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (rerun: 32) 23:31:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:14 executing program 5: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x5, 0x4, 0xff, 0x0, 0x6, 0x9002, 0xf, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x0, 0x10200000000}, 0x4, 0x7, 0x40000, 0x0, 0x9, 0x70f, 0x7fff, 0x0, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, r3, 0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:14 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 741.203908][ T1341] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 741.211720][ T1341] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 741.219539][ T1341] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 741.227347][ T1341] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 741.235154][ T1341] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 741.242968][ T1341] 23:31:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 741.291387][ T1395] FAULT_INJECTION: forcing a failure. [ 741.291387][ T1395] name failslab, interval 1, probability 0, space 0, times 0 [ 741.308734][ T1395] CPU: 0 PID: 1395 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 741.318725][ T1395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 741.328620][ T1395] Call Trace: [ 741.331743][ T1395] [ 741.334522][ T1395] dump_stack_lvl+0x151/0x1b7 [ 741.339037][ T1395] ? bfq_pos_tree_add_move+0x43e/0x43e [ 741.344339][ T1395] dump_stack+0x15/0x17 [ 741.348316][ T1395] should_fail+0x3c0/0x510 [ 741.352570][ T1395] __should_failslab+0x9f/0xe0 [ 741.357169][ T1395] should_failslab+0x9/0x20 [ 741.361513][ T1395] kmem_cache_alloc+0x4f/0x2f0 [ 741.366113][ T1395] ? vm_area_dup+0x26/0x1d0 [ 741.370448][ T1395] vm_area_dup+0x26/0x1d0 [ 741.374612][ T1395] dup_mmap+0x6b8/0xea0 [ 741.378611][ T1395] ? __delayed_free_task+0x20/0x20 [ 741.383553][ T1395] ? mm_init+0x807/0x960 [ 741.387632][ T1395] dup_mm+0x91/0x330 [ 741.391366][ T1395] copy_mm+0x108/0x1b0 [ 741.395276][ T1395] copy_process+0x1295/0x3250 [ 741.399785][ T1395] ? proc_fail_nth_write+0x213/0x290 [ 741.404908][ T1395] ? proc_fail_nth_read+0x220/0x220 [ 741.409940][ T1395] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 741.414885][ T1395] ? vfs_write+0x9af/0x1050 [ 741.419225][ T1395] ? vmacache_update+0xb7/0x120 [ 741.423912][ T1395] kernel_clone+0x22d/0x990 [ 741.428251][ T1395] ? file_end_write+0x1b0/0x1b0 [ 741.432950][ T1395] ? __kasan_check_write+0x14/0x20 [ 741.437885][ T1395] ? create_io_thread+0x1e0/0x1e0 [ 741.442746][ T1395] ? __mutex_lock_slowpath+0x10/0x10 [ 741.447868][ T1395] __x64_sys_clone+0x289/0x310 [ 741.452555][ T1395] ? __do_sys_vfork+0x130/0x130 [ 741.457245][ T1395] ? debug_smp_processor_id+0x17/0x20 [ 741.462449][ T1395] do_syscall_64+0x44/0xd0 [ 741.466790][ T1395] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 741.472516][ T1395] RIP: 0033:0x7f14733430a9 [ 741.476772][ T1395] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 741.496213][ T1395] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 741.504719][ T1395] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 741.512614][ T1395] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 741.520429][ T1395] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 741.528325][ T1395] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:14 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:31:14 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:31:15 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 49) [ 741.536136][ T1395] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 741.543949][ T1395] 23:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:15 executing program 5: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) (async) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x5, 0x4, 0xff, 0x0, 0x6, 0x9002, 0xf, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x0, 0x10200000000}, 0x4, 0x7, 0x40000, 0x0, 0x9, 0x70f, 0x7fff, 0x0, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, r3, 0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) (async, rerun: 64) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (rerun: 64) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r2, r2, r2, r3]}, 0x80) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x99f79f7719dc7cb}, 0x10) (async) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000003380), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="9500000000000000185300000dce69c7acd4925bf200000020b5050000080000d0034418", @ANYRES32=r0, @ANYBLOB="00000000000000008500000061000000"], &(0x7f00000001c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000200)=""/227, 0x40f00, 0x12, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x200, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x4, 0x3, 0xf439}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r2, r4, r5]}, 0x80) (async) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) (async) r7 = openat$cgroup_subtree(r6, &(0x7f00000005c0), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000600)={[{0x2b, 'cpuacct'}, {0x2b, 'perf_event'}, {0x2b, 'rlimit'}, {0x2b, 'pids'}, {0x2b, 'net_cls'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2d, 'pids'}, {0x0, 'cpuacct'}]}, 0x4b) (async) ioctl$TUNGETVNETLE(r6, 0x800454dd, &(0x7f00000004c0)) [ 741.575447][ T1407] FAULT_INJECTION: forcing a failure. [ 741.575447][ T1407] name failslab, interval 1, probability 0, space 0, times 0 [ 741.587955][ T1407] CPU: 1 PID: 1407 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 741.597853][ T1407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 741.607745][ T1407] Call Trace: [ 741.610870][ T1407] [ 741.613649][ T1407] dump_stack_lvl+0x151/0x1b7 [ 741.618160][ T1407] ? bfq_pos_tree_add_move+0x43e/0x43e 23:31:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 741.623459][ T1407] dump_stack+0x15/0x17 [ 741.627449][ T1407] should_fail+0x3c0/0x510 [ 741.631701][ T1407] __should_failslab+0x9f/0xe0 [ 741.636301][ T1407] should_failslab+0x9/0x20 [ 741.640651][ T1407] kmem_cache_alloc+0x4f/0x2f0 [ 741.645253][ T1407] ? vm_area_dup+0x26/0x1d0 [ 741.649586][ T1407] vm_area_dup+0x26/0x1d0 [ 741.653749][ T1407] dup_mmap+0x6b8/0xea0 [ 741.657740][ T1407] ? __delayed_free_task+0x20/0x20 [ 741.662687][ T1407] ? mm_init+0x807/0x960 [ 741.666763][ T1407] dup_mm+0x91/0x330 [ 741.670496][ T1407] copy_mm+0x108/0x1b0 23:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x0, 0x1000000, 0x0, 0x1}, 0x20) 23:31:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x0, 0x1000000, 0x0, 0x1}, 0x20) [ 741.674403][ T1407] copy_process+0x1295/0x3250 [ 741.678920][ T1407] ? proc_fail_nth_write+0x213/0x290 [ 741.684039][ T1407] ? proc_fail_nth_read+0x220/0x220 [ 741.689122][ T1407] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 741.694022][ T1407] ? vfs_write+0x9af/0x1050 [ 741.698357][ T1407] ? vmacache_update+0xb7/0x120 [ 741.703046][ T1407] kernel_clone+0x22d/0x990 [ 741.707387][ T1407] ? file_end_write+0x1b0/0x1b0 [ 741.712094][ T1407] ? __kasan_check_write+0x14/0x20 [ 741.717028][ T1407] ? create_io_thread+0x1e0/0x1e0 23:31:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x0, 0x1000000, 0x0, 0x1}, 0x20) [ 741.721883][ T1407] ? __mutex_lock_slowpath+0x10/0x10 [ 741.727000][ T1407] __x64_sys_clone+0x289/0x310 [ 741.731599][ T1407] ? __do_sys_vfork+0x130/0x130 [ 741.736290][ T1407] ? debug_smp_processor_id+0x17/0x20 [ 741.741497][ T1407] do_syscall_64+0x44/0xd0 [ 741.745746][ T1407] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 741.751472][ T1407] RIP: 0033:0x7f14733430a9 [ 741.755727][ T1407] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 741.776907][ T1407] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 741.785155][ T1407] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 741.792962][ T1407] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 741.800775][ T1407] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 741.808586][ T1407] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 741.816395][ T1407] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 23:31:15 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 50) 23:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x1000000, 0x8d}, 0x20) 23:31:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r2, r2, r2, r3]}, 0x80) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x99f79f7719dc7cb}, 0x10) (async) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000003380), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="9500000000000000185300000dce69c7acd4925bf200000020b5050000080000d0034418", @ANYRES32=r0, @ANYBLOB="00000000000000008500000061000000"], &(0x7f00000001c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000200)=""/227, 0x40f00, 0x12, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x200, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x4, 0x3, 0xf439}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r2, r4, r5]}, 0x80) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) (async) r7 = openat$cgroup_subtree(r6, &(0x7f00000005c0), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000600)={[{0x2b, 'cpuacct'}, {0x2b, 'perf_event'}, {0x2b, 'rlimit'}, {0x2b, 'pids'}, {0x2b, 'net_cls'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2d, 'pids'}, {0x0, 'cpuacct'}]}, 0x4b) (async) ioctl$TUNGETVNETLE(r6, 0x800454dd, &(0x7f00000004c0)) 23:31:15 executing program 5: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) (async) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x5, 0x4, 0xff, 0x0, 0x6, 0x9002, 0xf, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x0, 0x10200000000}, 0x4, 0x7, 0x40000, 0x0, 0x9, 0x70f, 0x7fff, 0x0, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, r3, 0x7) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x1000000, 0x8d}, 0x20) [ 741.824203][ T1407] 23:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x1000000, 0x8d}, 0x20) 23:31:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 741.854411][ T1441] FAULT_INJECTION: forcing a failure. [ 741.854411][ T1441] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 741.933348][ T1441] CPU: 0 PID: 1441 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 741.943344][ T1441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 741.953243][ T1441] Call Trace: [ 741.956364][ T1441] [ 741.959153][ T1441] dump_stack_lvl+0x151/0x1b7 [ 741.963656][ T1441] ? bfq_pos_tree_add_move+0x43e/0x43e [ 741.968954][ T1441] dump_stack+0x15/0x17 [ 741.972940][ T1441] should_fail+0x3c0/0x510 [ 741.977194][ T1441] should_fail_alloc_page+0x58/0x70 [ 741.982227][ T1441] __alloc_pages+0x1de/0x7c0 [ 741.986659][ T1441] ? __count_vm_events+0x30/0x30 [ 741.991432][ T1441] ? __this_cpu_preempt_check+0x13/0x20 [ 741.996803][ T1441] ? __mod_node_page_state+0xac/0xf0 [ 742.001927][ T1441] pte_alloc_one+0x73/0x1b0 [ 742.006273][ T1441] ? pfn_modify_allowed+0x2e0/0x2e0 [ 742.011300][ T1441] __pte_alloc+0x86/0x350 [ 742.015467][ T1441] ? free_pgtables+0x210/0x210 [ 742.020069][ T1441] ? _raw_spin_lock+0xa3/0x1b0 [ 742.024666][ T1441] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 742.029875][ T1441] ? __kernel_text_address+0x9a/0x110 [ 742.035085][ T1441] copy_pte_range+0x1b1f/0x20b0 [ 742.039770][ T1441] ? __kunmap_atomic+0x80/0x80 [ 742.044461][ T1441] ? __kasan_slab_alloc+0xc4/0xe0 [ 742.049318][ T1441] ? __kasan_slab_alloc+0xb2/0xe0 [ 742.054177][ T1441] ? kmem_cache_alloc+0x189/0x2f0 [ 742.059039][ T1441] ? vm_area_dup+0x26/0x1d0 [ 742.063376][ T1441] ? dup_mmap+0x6b8/0xea0 [ 742.067538][ T1441] ? dup_mm+0x91/0x330 [ 742.071449][ T1441] ? copy_mm+0x108/0x1b0 [ 742.075529][ T1441] ? copy_process+0x1295/0x3250 [ 742.080214][ T1441] ? kernel_clone+0x22d/0x990 [ 742.084731][ T1441] ? __x64_sys_clone+0x289/0x310 [ 742.089505][ T1441] ? do_syscall_64+0x44/0xd0 [ 742.093925][ T1441] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 742.100365][ T1441] copy_page_range+0xc1e/0x1090 [ 742.105048][ T1441] ? pfn_valid+0x1e0/0x1e0 [ 742.109301][ T1441] dup_mmap+0x99f/0xea0 [ 742.113304][ T1441] ? __delayed_free_task+0x20/0x20 [ 742.118238][ T1441] ? mm_init+0x807/0x960 [ 742.122325][ T1441] dup_mm+0x91/0x330 [ 742.126058][ T1441] copy_mm+0x108/0x1b0 [ 742.129957][ T1441] copy_process+0x1295/0x3250 [ 742.134472][ T1441] ? proc_fail_nth_write+0x213/0x290 [ 742.139588][ T1441] ? proc_fail_nth_read+0x220/0x220 [ 742.144622][ T1441] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 742.149571][ T1441] ? vfs_write+0x9af/0x1050 [ 742.153909][ T1441] ? vmacache_update+0xb7/0x120 [ 742.158597][ T1441] kernel_clone+0x22d/0x990 [ 742.162935][ T1441] ? file_end_write+0x1b0/0x1b0 [ 742.167634][ T1441] ? __kasan_check_write+0x14/0x20 [ 742.172660][ T1441] ? create_io_thread+0x1e0/0x1e0 [ 742.177518][ T1441] ? __mutex_lock_slowpath+0x10/0x10 [ 742.182723][ T1441] __x64_sys_clone+0x289/0x310 [ 742.187328][ T1441] ? __do_sys_vfork+0x130/0x130 [ 742.192015][ T1441] ? debug_smp_processor_id+0x17/0x20 [ 742.197218][ T1441] do_syscall_64+0x44/0xd0 [ 742.201474][ T1441] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 742.207200][ T1441] RIP: 0033:0x7f14733430a9 [ 742.211466][ T1441] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:31:15 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 51) 23:31:15 executing program 5: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="8fc252fb3d0c352b84d5cccd1b3f9ca8276f3ee90bd1e3af78d69cf3b21516e0eb45500c88bf6b18b08253f2"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) 23:31:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) 23:31:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 742.230895][ T1441] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 742.239142][ T1441] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 742.246954][ T1441] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 742.254763][ T1441] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 742.262575][ T1441] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 742.270386][ T1441] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 742.278199][ T1441] 23:31:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) (async) 23:31:15 executing program 5: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="8fc252fb3d0c352b84d5cccd1b3f9ca8276f3ee90bd1e3af78d69cf3b21516e0eb45500c88bf6b18b08253f2"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) 23:31:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 742.315335][ T1478] FAULT_INJECTION: forcing a failure. [ 742.315335][ T1478] name failslab, interval 1, probability 0, space 0, times 0 [ 742.365242][ T1478] CPU: 1 PID: 1478 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 742.375240][ T1478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 742.385139][ T1478] Call Trace: [ 742.388254][ T1478] [ 742.391029][ T1478] dump_stack_lvl+0x151/0x1b7 [ 742.395545][ T1478] ? bfq_pos_tree_add_move+0x43e/0x43e [ 742.401097][ T1478] dump_stack+0x15/0x17 [ 742.405092][ T1478] should_fail+0x3c0/0x510 [ 742.409337][ T1478] __should_failslab+0x9f/0xe0 [ 742.413937][ T1478] should_failslab+0x9/0x20 [ 742.418278][ T1478] kmem_cache_alloc+0x4f/0x2f0 [ 742.422876][ T1478] ? vm_area_dup+0x26/0x1d0 [ 742.427217][ T1478] vm_area_dup+0x26/0x1d0 [ 742.431385][ T1478] dup_mmap+0x6b8/0xea0 [ 742.435375][ T1478] ? __delayed_free_task+0x20/0x20 [ 742.440328][ T1478] ? mm_init+0x807/0x960 [ 742.444404][ T1478] dup_mm+0x91/0x330 [ 742.448133][ T1478] copy_mm+0x108/0x1b0 [ 742.452041][ T1478] copy_process+0x1295/0x3250 [ 742.456551][ T1478] ? proc_fail_nth_write+0x213/0x290 [ 742.461673][ T1478] ? proc_fail_nth_read+0x220/0x220 [ 742.466706][ T1478] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 742.471654][ T1478] ? vfs_write+0x9af/0x1050 [ 742.475994][ T1478] ? vmacache_update+0xb7/0x120 [ 742.480685][ T1478] kernel_clone+0x22d/0x990 [ 742.485021][ T1478] ? file_end_write+0x1b0/0x1b0 [ 742.489709][ T1478] ? __kasan_check_write+0x14/0x20 [ 742.494794][ T1478] ? create_io_thread+0x1e0/0x1e0 [ 742.499626][ T1478] ? __mutex_lock_slowpath+0x10/0x10 [ 742.504748][ T1478] __x64_sys_clone+0x289/0x310 [ 742.509347][ T1478] ? __do_sys_vfork+0x130/0x130 [ 742.514297][ T1478] ? debug_smp_processor_id+0x17/0x20 [ 742.519505][ T1478] do_syscall_64+0x44/0xd0 [ 742.523755][ T1478] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 742.529482][ T1478] RIP: 0033:0x7f14733430a9 [ 742.533736][ T1478] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 742.553187][ T1478] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:16 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 52) 23:31:16 executing program 5: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="8fc252fb3d0c352b84d5cccd1b3f9ca8276f3ee90bd1e3af78d69cf3b21516e0eb45500c88bf6b18b08253f2"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="8fc252fb3d0c352b84d5cccd1b3f9ca8276f3ee90bd1e3af78d69cf3b21516e0eb45500c88bf6b18b08253f2"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) (async) 23:31:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) (async) 23:31:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0xffffffff, 0xfff, 0xffffdb17, 0x80, 0xffffffffffffffff, 0x800004, '\x00', 0x0, r0, 0x5, 0x3, 0x4}, 0x48) 23:31:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) [ 742.561423][ T1478] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 742.569232][ T1478] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 742.577047][ T1478] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 742.584854][ T1478] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 742.592666][ T1478] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 742.600482][ T1478] 23:31:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x1, 0x0, 0xa, 0x2, 0xfffffffffffffff8, 0xfffffffffffffffc}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xd}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}]}, &(0x7f0000000140)='GPL\x00', 0xfffffff8, 0xde, &(0x7f00000001c0)=""/222, 0x41100, 0x8, '\x00', r0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xc, 0x9, 0x4}, 0x10, 0x2a63e, r1}, 0x80) 23:31:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0xffffffff, 0xfff, 0xffffdb17, 0x80, 0xffffffffffffffff, 0x800004, '\x00', 0x0, r0, 0x5, 0x3, 0x4}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0xffffffff, 0xfff, 0xffffdb17, 0x80, 0xffffffffffffffff, 0x800004, '\x00', 0x0, r0, 0x5, 0x3, 0x4}, 0x48) (async) [ 742.654054][ T1507] FAULT_INJECTION: forcing a failure. [ 742.654054][ T1507] name failslab, interval 1, probability 0, space 0, times 0 [ 742.691526][ T1507] CPU: 0 PID: 1507 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 742.701518][ T1507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 742.711409][ T1507] Call Trace: [ 742.714531][ T1507] [ 742.717307][ T1507] dump_stack_lvl+0x151/0x1b7 [ 742.721820][ T1507] ? bfq_pos_tree_add_move+0x43e/0x43e [ 742.727117][ T1507] dump_stack+0x15/0x17 [ 742.731115][ T1507] should_fail+0x3c0/0x510 [ 742.735740][ T1507] __should_failslab+0x9f/0xe0 [ 742.740341][ T1507] should_failslab+0x9/0x20 [ 742.744680][ T1507] kmem_cache_alloc+0x4f/0x2f0 [ 742.749277][ T1507] ? vm_area_dup+0x26/0x1d0 [ 742.753613][ T1507] vm_area_dup+0x26/0x1d0 [ 742.757780][ T1507] dup_mmap+0x6b8/0xea0 [ 742.762073][ T1507] ? __delayed_free_task+0x20/0x20 [ 742.767010][ T1507] ? mm_init+0x807/0x960 [ 742.771090][ T1507] dup_mm+0x91/0x330 [ 742.774819][ T1507] copy_mm+0x108/0x1b0 [ 742.778720][ T1507] copy_process+0x1295/0x3250 [ 742.783237][ T1507] ? proc_fail_nth_write+0x213/0x290 [ 742.788356][ T1507] ? proc_fail_nth_read+0x220/0x220 [ 742.793402][ T1507] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 742.798335][ T1507] ? vfs_write+0x9af/0x1050 [ 742.802673][ T1507] ? vmacache_update+0xb7/0x120 [ 742.807363][ T1507] kernel_clone+0x22d/0x990 [ 742.811702][ T1507] ? file_end_write+0x1b0/0x1b0 [ 742.816388][ T1507] ? __kasan_check_write+0x14/0x20 [ 742.821336][ T1507] ? create_io_thread+0x1e0/0x1e0 [ 742.826207][ T1507] ? __mutex_lock_slowpath+0x10/0x10 [ 742.831326][ T1507] __x64_sys_clone+0x289/0x310 [ 742.835920][ T1507] ? __do_sys_vfork+0x130/0x130 [ 742.840614][ T1507] ? debug_smp_processor_id+0x17/0x20 [ 742.845824][ T1507] do_syscall_64+0x44/0xd0 [ 742.850067][ T1507] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 742.855796][ T1507] RIP: 0033:0x7f14733430a9 [ 742.860052][ T1507] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 742.879490][ T1507] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 742.887732][ T1507] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 742.895543][ T1507] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:16 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 53) 23:31:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xb, &(0x7f00000001c0)=@framed={{}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x1, 0x0, 0xa, 0x2, 0xfffffffffffffff8, 0xfffffffffffffffc}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xd}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}]}, &(0x7f0000000140)='GPL\x00', 0xfffffff8, 0xde, &(0x7f00000001c0)=""/222, 0x41100, 0x8, '\x00', r0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xc, 0x9, 0x4}, 0x10, 0x2a63e, r1}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)}, 0x10) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x1, 0x0, 0xa, 0x2, 0xfffffffffffffff8, 0xfffffffffffffffc}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xd}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}]}, &(0x7f0000000140)='GPL\x00', 0xfffffff8, 0xde, &(0x7f00000001c0)=""/222, 0x41100, 0x8, '\x00', r0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xc, 0x9, 0x4}, 0x10, 0x2a63e, r1}, 0x80) (async) [ 742.903877][ T1507] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 742.911689][ T1507] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 742.919528][ T1507] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 742.927324][ T1507] 23:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0xffffffff, 0xfff, 0xffffdb17, 0x80, 0xffffffffffffffff, 0x800004, '\x00', 0x0, r0, 0x5, 0x3, 0x4}, 0x48) 23:31:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x9, &(0x7f00000001c0)=@framed={{}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x401}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x1, 0x0, 0xa, 0x2, 0xfffffffffffffff8, 0xfffffffffffffffc}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xd}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}]}, &(0x7f0000000140)='GPL\x00', 0xfffffff8, 0xde, &(0x7f00000001c0)=""/222, 0x41100, 0x8, '\x00', r0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xc, 0x9, 0x4}, 0x10, 0x2a63e, r1}, 0x80) 23:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 742.974064][ T1532] FAULT_INJECTION: forcing a failure. [ 742.974064][ T1532] name failslab, interval 1, probability 0, space 0, times 0 [ 742.986685][ T1532] CPU: 1 PID: 1532 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 742.996660][ T1532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 743.006554][ T1532] Call Trace: [ 743.009678][ T1532] [ 743.012460][ T1532] dump_stack_lvl+0x151/0x1b7 [ 743.016972][ T1532] ? bfq_pos_tree_add_move+0x43e/0x43e 23:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) [ 743.022264][ T1532] dump_stack+0x15/0x17 [ 743.026256][ T1532] should_fail+0x3c0/0x510 [ 743.030510][ T1532] __should_failslab+0x9f/0xe0 [ 743.035111][ T1532] should_failslab+0x9/0x20 [ 743.039450][ T1532] kmem_cache_alloc+0x4f/0x2f0 [ 743.044050][ T1532] ? vm_area_dup+0x26/0x1d0 [ 743.048386][ T1532] ? __kasan_check_read+0x11/0x20 [ 743.053247][ T1532] vm_area_dup+0x26/0x1d0 [ 743.057503][ T1532] dup_mmap+0x6b8/0xea0 [ 743.061497][ T1532] ? __delayed_free_task+0x20/0x20 [ 743.066442][ T1532] ? mm_init+0x807/0x960 [ 743.070523][ T1532] dup_mm+0x91/0x330 [ 743.074254][ T1532] copy_mm+0x108/0x1b0 [ 743.078158][ T1532] copy_process+0x1295/0x3250 [ 743.082679][ T1532] ? proc_fail_nth_write+0x213/0x290 [ 743.087793][ T1532] ? proc_fail_nth_read+0x220/0x220 [ 743.092830][ T1532] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 743.097774][ T1532] ? vfs_write+0x9af/0x1050 [ 743.102113][ T1532] ? vmacache_update+0xb7/0x120 [ 743.106807][ T1532] kernel_clone+0x22d/0x990 [ 743.111140][ T1532] ? file_end_write+0x1b0/0x1b0 [ 743.115829][ T1532] ? __kasan_check_write+0x14/0x20 [ 743.120776][ T1532] ? create_io_thread+0x1e0/0x1e0 [ 743.125635][ T1532] ? __mutex_lock_slowpath+0x10/0x10 [ 743.130756][ T1532] __x64_sys_clone+0x289/0x310 [ 743.135361][ T1532] ? __do_sys_vfork+0x130/0x130 [ 743.140045][ T1532] ? debug_smp_processor_id+0x17/0x20 [ 743.145255][ T1532] do_syscall_64+0x44/0xd0 [ 743.149503][ T1532] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 743.155231][ T1532] RIP: 0033:0x7f14733430a9 [ 743.159486][ T1532] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 743.179013][ T1532] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 743.187358][ T1532] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 743.195185][ T1532] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 743.202982][ T1532] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 743.210791][ T1532] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:16 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 54) 23:31:16 executing program 5: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000001c0), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000240)=""/233, 0xe9}, {&(0x7f0000000340)=""/201, 0xc9}, {&(0x7f0000000440)=""/154, 0x9a}, {&(0x7f0000000500)=""/254, 0xfe}, {&(0x7f0000000600)=""/191, 0xbf}, {&(0x7f00000006c0)=""/91, 0x5b}, {&(0x7f0000000740)=""/208, 0xd0}, {&(0x7f0000000000)=""/32, 0x20}], 0x8, &(0x7f00000008c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}, 0x100) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="40f52b17d0010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:16 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) openat$cgroup_type(r0, &(0x7f00000000c0), 0x2, 0x0) socketpair(0x3, 0x3, 0x100, &(0x7f0000000040)) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/146, 0x5c, 0x92}, 0x20) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000240)='cpuset.memory_migrate\x00', 0x2, 0x0) 23:31:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x7, &(0x7f00000001c0)=@framed={{}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x5, &(0x7f00000001c0)=@framed={{}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:16 executing program 5: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000001c0), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000240)=""/233, 0xe9}, {&(0x7f0000000340)=""/201, 0xc9}, {&(0x7f0000000440)=""/154, 0x9a}, {&(0x7f0000000500)=""/254, 0xfe}, {&(0x7f0000000600)=""/191, 0xbf}, {&(0x7f00000006c0)=""/91, 0x5b}, {&(0x7f0000000740)=""/208, 0xd0}, {&(0x7f0000000000)=""/32, 0x20}], 0x8, &(0x7f00000008c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}, 0x100) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="40f52b17d0010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:16 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) openat$cgroup_type(r0, &(0x7f00000000c0), 0x2, 0x0) (async, rerun: 32) socketpair(0x3, 0x3, 0x100, &(0x7f0000000040)) (rerun: 32) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/146, 0x5c, 0x92}, 0x20) (async) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000240)='cpuset.memory_migrate\x00', 0x2, 0x0) [ 743.218601][ T1532] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 743.226415][ T1532] 23:31:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:16 executing program 5: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000001c0), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000240)=""/233, 0xe9}, {&(0x7f0000000340)=""/201, 0xc9}, {&(0x7f0000000440)=""/154, 0x9a}, {&(0x7f0000000500)=""/254, 0xfe}, {&(0x7f0000000600)=""/191, 0xbf}, {&(0x7f00000006c0)=""/91, 0x5b}, {&(0x7f0000000740)=""/208, 0xd0}, {&(0x7f0000000000)=""/32, 0x20}], 0x8, &(0x7f00000008c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}, 0x100) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="40f52b17d0010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 743.263185][ T1564] FAULT_INJECTION: forcing a failure. [ 743.263185][ T1564] name failslab, interval 1, probability 0, space 0, times 0 [ 743.293367][ T1564] CPU: 0 PID: 1564 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 743.303709][ T1564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 743.313605][ T1564] Call Trace: [ 743.316723][ T1564] [ 743.319516][ T1564] dump_stack_lvl+0x151/0x1b7 [ 743.324112][ T1564] ? bfq_pos_tree_add_move+0x43e/0x43e [ 743.329405][ T1564] dump_stack+0x15/0x17 [ 743.333388][ T1564] should_fail+0x3c0/0x510 [ 743.337642][ T1564] __should_failslab+0x9f/0xe0 [ 743.342241][ T1564] should_failslab+0x9/0x20 [ 743.346581][ T1564] kmem_cache_alloc+0x4f/0x2f0 [ 743.351269][ T1564] ? vm_area_dup+0x26/0x1d0 [ 743.355609][ T1564] vm_area_dup+0x26/0x1d0 [ 743.359773][ T1564] dup_mmap+0x6b8/0xea0 [ 743.363771][ T1564] ? __delayed_free_task+0x20/0x20 [ 743.368712][ T1564] ? mm_init+0x807/0x960 [ 743.372790][ T1564] dup_mm+0x91/0x330 [ 743.376520][ T1564] copy_mm+0x108/0x1b0 [ 743.380432][ T1564] copy_process+0x1295/0x3250 [ 743.384940][ T1564] ? proc_fail_nth_write+0x213/0x290 [ 743.390062][ T1564] ? proc_fail_nth_read+0x220/0x220 [ 743.395092][ T1564] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 743.400041][ T1564] ? vfs_write+0x9af/0x1050 [ 743.404379][ T1564] ? vmacache_update+0xb7/0x120 [ 743.409161][ T1564] kernel_clone+0x22d/0x990 [ 743.413494][ T1564] ? file_end_write+0x1b0/0x1b0 [ 743.418185][ T1564] ? __kasan_check_write+0x14/0x20 [ 743.423128][ T1564] ? create_io_thread+0x1e0/0x1e0 [ 743.427990][ T1564] ? __mutex_lock_slowpath+0x10/0x10 [ 743.433111][ T1564] __x64_sys_clone+0x289/0x310 [ 743.437711][ T1564] ? __do_sys_vfork+0x130/0x130 [ 743.442399][ T1564] ? debug_smp_processor_id+0x17/0x20 [ 743.447611][ T1564] do_syscall_64+0x44/0xd0 [ 743.451861][ T1564] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 743.457584][ T1564] RIP: 0033:0x7f14733430a9 [ 743.461839][ T1564] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 743.481286][ T1564] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 743.489526][ T1564] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 743.497339][ T1564] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 743.505151][ T1564] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:17 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 55) 23:31:17 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) openat$cgroup_type(r0, &(0x7f00000000c0), 0x2, 0x0) socketpair(0x3, 0x3, 0x100, &(0x7f0000000040)) (async) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/146, 0x5c, 0x92}, 0x20) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000240)='cpuset.memory_migrate\x00', 0x2, 0x0) 23:31:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000001c0)=@framed, 0x0, 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb014018a30f1afab44b7228d789385a6c0c77f22e7c4771346191d50489060e64c7baf7d62b6b4cc76e660efd27becd0af4901be82546896c5ee2f07152e20b5de5f490a4a7bb8a281ca194c3a2acd74977d299744d22b9d8a3"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x4}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x22b6, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x8, 0x0, &(0x7f0000000240), 0x40f00, 0x5, '\x00', r0, 0x25, r1, 0x8, &(0x7f0000000340)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0xa, 0x8, 0x800}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r2, 0xffffffffffffffff]}, 0x80) 23:31:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb014018a30f1afab44b7228d789385a6c0c77f22e7c4771346191d50489060e64c7baf7d62b6b4cc76e660efd27becd0af4901be82546896c5ee2f07152e20b5de5f490a4a7bb8a281ca194c3a2acd74977d299744d22b9d8a3"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x4}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x22b6, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x8, 0x0, &(0x7f0000000240), 0x40f00, 0x5, '\x00', r0, 0x25, r1, 0x8, &(0x7f0000000340)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0xa, 0x8, 0x800}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb014018a30f1afab44b7228d789385a6c0c77f22e7c4771346191d50489060e64c7baf7d62b6b4cc76e660efd27becd0af4901be82546896c5ee2f07152e20b5de5f490a4a7bb8a281ca194c3a2acd74977d299744d22b9d8a3"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)}, 0x10) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x4}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x22b6, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x8, 0x0, &(0x7f0000000240), 0x40f00, 0x5, '\x00', r0, 0x25, r1, 0x8, &(0x7f0000000340)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0xa, 0x8, 0x800}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r2, 0xffffffffffffffff]}, 0x80) (async) [ 743.512960][ T1564] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 743.520771][ T1564] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 743.528585][ T1564] 23:31:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000001c0)=@framed, 0x0, 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x2f}, 0x20) [ 743.562724][ T1592] FAULT_INJECTION: forcing a failure. [ 743.562724][ T1592] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 743.576312][ T1592] CPU: 0 PID: 1592 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 743.586561][ T1592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 743.596460][ T1592] Call Trace: [ 743.599581][ T1592] [ 743.602366][ T1592] dump_stack_lvl+0x151/0x1b7 [ 743.606878][ T1592] ? bfq_pos_tree_add_move+0x43e/0x43e 23:31:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 743.612169][ T1592] dump_stack+0x15/0x17 [ 743.616156][ T1592] should_fail+0x3c0/0x510 [ 743.620413][ T1592] should_fail_alloc_page+0x58/0x70 [ 743.625446][ T1592] __alloc_pages+0x1de/0x7c0 [ 743.629879][ T1592] ? __count_vm_events+0x30/0x30 [ 743.634733][ T1592] ? __this_cpu_preempt_check+0x13/0x20 [ 743.640114][ T1592] ? __mod_node_page_state+0xac/0xf0 [ 743.645238][ T1592] pte_alloc_one+0x73/0x1b0 [ 743.649575][ T1592] ? pfn_modify_allowed+0x2e0/0x2e0 [ 743.654697][ T1592] __pte_alloc+0x86/0x350 [ 743.658866][ T1592] ? free_pgtables+0x210/0x210 [ 743.663463][ T1592] ? _raw_spin_lock+0xa3/0x1b0 [ 743.668060][ T1592] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 743.673273][ T1592] ? __kernel_text_address+0x9a/0x110 [ 743.678478][ T1592] copy_pte_range+0x1b1f/0x20b0 [ 743.683252][ T1592] ? __kunmap_atomic+0x80/0x80 [ 743.687847][ T1592] ? __kasan_slab_alloc+0xc4/0xe0 [ 743.692708][ T1592] ? __kasan_slab_alloc+0xb2/0xe0 [ 743.697570][ T1592] ? kmem_cache_alloc+0x189/0x2f0 [ 743.702424][ T1592] ? vm_area_dup+0x26/0x1d0 [ 743.706763][ T1592] ? dup_mmap+0x6b8/0xea0 [ 743.710942][ T1592] ? dup_mm+0x91/0x330 [ 743.714834][ T1592] ? copy_mm+0x108/0x1b0 [ 743.718917][ T1592] ? copy_process+0x1295/0x3250 [ 743.723600][ T1592] ? kernel_clone+0x22d/0x990 [ 743.728123][ T1592] ? __x64_sys_clone+0x289/0x310 [ 743.732891][ T1592] ? do_syscall_64+0x44/0xd0 [ 743.737316][ T1592] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 743.743219][ T1592] copy_page_range+0xc1e/0x1090 [ 743.747908][ T1592] ? pfn_valid+0x1e0/0x1e0 [ 743.752157][ T1592] dup_mmap+0x99f/0xea0 [ 743.756151][ T1592] ? __delayed_free_task+0x20/0x20 [ 743.761102][ T1592] ? mm_init+0x807/0x960 [ 743.765174][ T1592] dup_mm+0x91/0x330 [ 743.768908][ T1592] copy_mm+0x108/0x1b0 [ 743.772816][ T1592] copy_process+0x1295/0x3250 [ 743.777330][ T1592] ? proc_fail_nth_write+0x213/0x290 [ 743.782449][ T1592] ? proc_fail_nth_read+0x220/0x220 [ 743.787508][ T1592] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 743.792440][ T1592] ? vfs_write+0x9af/0x1050 [ 743.796774][ T1592] ? vmacache_update+0xb7/0x120 [ 743.801469][ T1592] kernel_clone+0x22d/0x990 [ 743.805802][ T1592] ? file_end_write+0x1b0/0x1b0 [ 743.810484][ T1592] ? __kasan_check_write+0x14/0x20 [ 743.815430][ T1592] ? create_io_thread+0x1e0/0x1e0 [ 743.820294][ T1592] ? __mutex_lock_slowpath+0x10/0x10 [ 743.825411][ T1592] __x64_sys_clone+0x289/0x310 [ 743.830014][ T1592] ? __do_sys_vfork+0x130/0x130 [ 743.834697][ T1592] ? debug_smp_processor_id+0x17/0x20 [ 743.839915][ T1592] do_syscall_64+0x44/0xd0 [ 743.844162][ T1592] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 743.849889][ T1592] RIP: 0033:0x7f14733430a9 [ 743.854150][ T1592] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 743.873675][ T1592] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 743.881922][ T1592] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 743.889732][ T1592] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 743.897534][ T1592] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 743.905355][ T1592] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:17 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 56) 23:31:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000001c0)=@framed, 0x0, 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x0, 0x1000000, 0x0, 0x1}, 0x20) 23:31:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x2f}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x2f}, 0x20) (async) 23:31:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb014018a30f1afab44b7228d789385a6c0c77f22e7c4771346191d50489060e64c7baf7d62b6b4cc76e660efd27becd0af4901be82546896c5ee2f07152e20b5de5f490a4a7bb8a281ca194c3a2acd74977d299744d22b9d8a3"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x4}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x22b6, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x8, 0x0, &(0x7f0000000240), 0x40f00, 0x5, '\x00', r0, 0x25, r1, 0x8, &(0x7f0000000340)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0xa, 0x8, 0x800}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r2, 0xffffffffffffffff]}, 0x80) 23:31:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) [ 743.913161][ T1592] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 743.921080][ T1592] [ 743.945425][ T1622] FAULT_INJECTION: forcing a failure. [ 743.945425][ T1622] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x0, 0x1000000, 0x0, 0x1}, 0x20) 23:31:17 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='fdb_delete\x00'}, 0x10) syz_clone(0x800, &(0x7f0000000200)="7dd2ecec39fe1b84932705ea76d5860073db308ed899d9a1f35af7d0efa79a2197d7b3595f7344e776272462054743a17ab88ddec2b413f49e87b6a6af98e44b6324e50ca829df5afbd5cc605d7e38bd832cc0e4ab6baebe3e6322445b9d050862ef0685af0cdc1180bd6295a96950f20ef38b4ddfaff4ebdbe695dd87edaea8814c2b595b52d2b9c144562eccc0600e7f90bcd1c633c79ce0b8d3b69000c7c69dd9e66ef11061adfdc22b420e183db9416fb28617924232ad15bbf9294b547b7e1de729fed13c2cba7ee90a681acda9f4d580", 0xd3, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="4eb647b0dab93224d8fa4fca865da1e3a61c09ac555489240eeb41eec9216569df86a6137de18fcbe8822b2f5a9851e54d3c3df4b39a1e6f21648cb5361519a552e4286605ce3d2c0c8a890b3eea93a9378d946dcf4bcf727864a8d68455389aedca8e9547656001760c1ea0317938a1d68a8858f928b650da0659c89c35d213876514533aa0af2ca143ca0293dc0beb5d33dd9153be66b45e4cb8529a08564e16e4447fb212dca95b22cfdb510ad3ce96bb2a5d5f270530f824a24f4ff824efe9a0b2e45372f009e3308504784d045c2600b04081352d07fb9150f4239e2a08c309c5489e6307b41f1332e29fd5acc9") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYRES8=r1, @ANYRES64=r1], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x70) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000180)=0x1) ioctl$TUNGETVNETLE(r2, 0x800454dd, &(0x7f00000001c0)) 23:31:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x2f}, 0x20) 23:31:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) [ 743.966511][ T1622] CPU: 0 PID: 1622 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 743.976501][ T1622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 743.986395][ T1622] Call Trace: [ 743.989519][ T1622] [ 743.992297][ T1622] dump_stack_lvl+0x151/0x1b7 [ 743.996811][ T1622] ? bfq_pos_tree_add_move+0x43e/0x43e [ 744.002114][ T1622] ? __switch_to+0x617/0x1170 [ 744.006620][ T1622] ? native_set_ldt+0x360/0x360 [ 744.011308][ T1622] dump_stack+0x15/0x17 [ 744.015300][ T1622] should_fail+0x3c0/0x510 [ 744.019551][ T1622] should_fail_alloc_page+0x58/0x70 [ 744.024586][ T1622] __alloc_pages+0x1de/0x7c0 [ 744.029013][ T1622] ? __count_vm_events+0x30/0x30 [ 744.033781][ T1622] ? __this_cpu_preempt_check+0x13/0x20 [ 744.041600][ T1622] pte_alloc_one+0x73/0x1b0 [ 744.045937][ T1622] ? pfn_modify_allowed+0x2e0/0x2e0 [ 744.051068][ T1622] ? preempt_schedule+0xd9/0xe0 [ 744.055743][ T1622] ? preempt_schedule_common+0xcb/0x100 [ 744.061123][ T1622] __pte_alloc+0x86/0x350 [ 744.065288][ T1622] ? free_pgtables+0x210/0x210 [ 744.069888][ T1622] ? _raw_spin_lock+0xa3/0x1b0 [ 744.074484][ T1622] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 744.079704][ T1622] ? preempt_schedule_thunk+0x16/0x18 [ 744.084902][ T1622] copy_pte_range+0x1b1f/0x20b0 [ 744.089677][ T1622] ? __kunmap_atomic+0x80/0x80 [ 744.094272][ T1622] ? __kasan_slab_alloc+0xc4/0xe0 [ 744.099136][ T1622] ? __kasan_slab_alloc+0xb2/0xe0 [ 744.103995][ T1622] ? kmem_cache_alloc+0x189/0x2f0 [ 744.108853][ T1622] ? vm_area_dup+0x26/0x1d0 [ 744.113195][ T1622] ? dup_mmap+0x6b8/0xea0 [ 744.117360][ T1622] ? dup_mm+0x91/0x330 [ 744.121266][ T1622] ? copy_mm+0x108/0x1b0 [ 744.125345][ T1622] ? copy_process+0x1295/0x3250 [ 744.130031][ T1622] ? kernel_clone+0x22d/0x990 [ 744.134545][ T1622] ? __x64_sys_clone+0x289/0x310 [ 744.139322][ T1622] ? do_syscall_64+0x44/0xd0 [ 744.143745][ T1622] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 744.149648][ T1622] copy_page_range+0xc1e/0x1090 [ 744.154336][ T1622] ? pfn_valid+0x1e0/0x1e0 [ 744.158587][ T1622] dup_mmap+0x99f/0xea0 [ 744.162581][ T1622] ? __delayed_free_task+0x20/0x20 [ 744.167526][ T1622] ? mm_init+0x807/0x960 [ 744.171607][ T1622] dup_mm+0x91/0x330 [ 744.175337][ T1622] copy_mm+0x108/0x1b0 [ 744.179245][ T1622] copy_process+0x1295/0x3250 [ 744.183758][ T1622] ? proc_fail_nth_write+0x213/0x290 [ 744.188880][ T1622] ? proc_fail_nth_read+0x220/0x220 [ 744.193912][ T1622] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 744.198859][ T1622] ? vfs_write+0x9af/0x1050 [ 744.203198][ T1622] ? vmacache_update+0xb7/0x120 [ 744.207897][ T1622] kernel_clone+0x22d/0x990 [ 744.212226][ T1622] ? file_end_write+0x1b0/0x1b0 [ 744.216914][ T1622] ? __kasan_check_write+0x14/0x20 [ 744.221890][ T1622] ? create_io_thread+0x1e0/0x1e0 [ 744.226719][ T1622] ? __mutex_lock_slowpath+0x10/0x10 [ 744.231843][ T1622] __x64_sys_clone+0x289/0x310 [ 744.236441][ T1622] ? __do_sys_vfork+0x130/0x130 [ 744.241129][ T1622] ? debug_smp_processor_id+0x17/0x20 [ 744.246597][ T1622] do_syscall_64+0x44/0xd0 [ 744.250853][ T1622] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 744.256576][ T1622] RIP: 0033:0x7f14733430a9 [ 744.260831][ T1622] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 744.280272][ T1622] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 744.288517][ T1622] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 744.296327][ T1622] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 744.304140][ T1622] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:17 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 57) 23:31:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:17 executing program 0: perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x0, 0x1000000, 0x0, 0x1}, 0x20) 23:31:17 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='fdb_delete\x00'}, 0x10) (rerun: 32) syz_clone(0x800, &(0x7f0000000200)="7dd2ecec39fe1b84932705ea76d5860073db308ed899d9a1f35af7d0efa79a2197d7b3595f7344e776272462054743a17ab88ddec2b413f49e87b6a6af98e44b6324e50ca829df5afbd5cc605d7e38bd832cc0e4ab6baebe3e6322445b9d050862ef0685af0cdc1180bd6295a96950f20ef38b4ddfaff4ebdbe695dd87edaea8814c2b595b52d2b9c144562eccc0600e7f90bcd1c633c79ce0b8d3b69000c7c69dd9e66ef11061adfdc22b420e183db9416fb28617924232ad15bbf9294b547b7e1de729fed13c2cba7ee90a681acda9f4d580", 0xd3, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="4eb647b0dab93224d8fa4fca865da1e3a61c09ac555489240eeb41eec9216569df86a6137de18fcbe8822b2f5a9851e54d3c3df4b39a1e6f21648cb5361519a552e4286605ce3d2c0c8a890b3eea93a9378d946dcf4bcf727864a8d68455389aedca8e9547656001760c1ea0317938a1d68a8858f928b650da0659c89c35d213876514533aa0af2ca143ca0293dc0beb5d33dd9153be66b45e4cb8529a08564e16e4447fb212dca95b22cfdb510ad3ce96bb2a5d5f270530f824a24f4ff824efe9a0b2e45372f009e3308504784d045c2600b04081352d07fb9150f4239e2a08c309c5489e6307b41f1332e29fd5acc9") (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYRES8=r1, @ANYRES64=r1], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x70) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000180)=0x1) (async) ioctl$TUNGETVNETLE(r2, 0x800454dd, &(0x7f00000001c0)) 23:31:17 executing program 0: perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 744.311957][ T1622] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 744.319763][ T1622] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 744.327586][ T1622] [ 744.342747][ T1642] FAULT_INJECTION: forcing a failure. [ 744.342747][ T1642] name failslab, interval 1, probability 0, space 0, times 0 [ 744.362644][ T1642] CPU: 0 PID: 1642 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 744.372636][ T1642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 744.382529][ T1642] Call Trace: [ 744.385652][ T1642] [ 744.388429][ T1642] dump_stack_lvl+0x151/0x1b7 [ 744.392942][ T1642] ? bfq_pos_tree_add_move+0x43e/0x43e [ 744.398236][ T1642] dump_stack+0x15/0x17 [ 744.402225][ T1642] should_fail+0x3c0/0x510 [ 744.406480][ T1642] __should_failslab+0x9f/0xe0 [ 744.411081][ T1642] should_failslab+0x9/0x20 [ 744.415430][ T1642] kmem_cache_alloc+0x4f/0x2f0 [ 744.420022][ T1642] ? vm_area_dup+0x26/0x1d0 [ 744.424365][ T1642] vm_area_dup+0x26/0x1d0 [ 744.428526][ T1642] dup_mmap+0x6b8/0xea0 [ 744.432523][ T1642] ? __delayed_free_task+0x20/0x20 [ 744.437464][ T1642] ? mm_init+0x807/0x960 [ 744.441544][ T1642] dup_mm+0x91/0x330 [ 744.445280][ T1642] copy_mm+0x108/0x1b0 [ 744.449186][ T1642] copy_process+0x1295/0x3250 [ 744.453696][ T1642] ? proc_fail_nth_write+0x213/0x290 [ 744.458818][ T1642] ? proc_fail_nth_read+0x220/0x220 [ 744.463863][ T1642] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 744.468814][ T1642] ? vfs_write+0x9af/0x1050 [ 744.473150][ T1642] ? vmacache_update+0xb7/0x120 [ 744.477825][ T1642] kernel_clone+0x22d/0x990 [ 744.482163][ T1642] ? file_end_write+0x1b0/0x1b0 [ 744.486852][ T1642] ? __kasan_check_write+0x14/0x20 [ 744.491805][ T1642] ? create_io_thread+0x1e0/0x1e0 [ 744.496657][ T1642] ? __mutex_lock_slowpath+0x10/0x10 [ 744.501794][ T1642] __x64_sys_clone+0x289/0x310 [ 744.506390][ T1642] ? __do_sys_vfork+0x130/0x130 [ 744.511070][ T1642] ? debug_smp_processor_id+0x17/0x20 [ 744.516274][ T1642] do_syscall_64+0x44/0xd0 [ 744.520526][ T1642] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 744.526254][ T1642] RIP: 0033:0x7f14733430a9 [ 744.530513][ T1642] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 744.549948][ T1642] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 744.558196][ T1642] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x1000000, 0x8d}, 0x20) 23:31:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:18 executing program 0: perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 744.566005][ T1642] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 744.573815][ T1642] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 744.581628][ T1642] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 744.589445][ T1642] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 744.597255][ T1642] 23:31:18 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 58) 23:31:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:18 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='fdb_delete\x00'}, 0x10) syz_clone(0x800, &(0x7f0000000200)="7dd2ecec39fe1b84932705ea76d5860073db308ed899d9a1f35af7d0efa79a2197d7b3595f7344e776272462054743a17ab88ddec2b413f49e87b6a6af98e44b6324e50ca829df5afbd5cc605d7e38bd832cc0e4ab6baebe3e6322445b9d050862ef0685af0cdc1180bd6295a96950f20ef38b4ddfaff4ebdbe695dd87edaea8814c2b595b52d2b9c144562eccc0600e7f90bcd1c633c79ce0b8d3b69000c7c69dd9e66ef11061adfdc22b420e183db9416fb28617924232ad15bbf9294b547b7e1de729fed13c2cba7ee90a681acda9f4d580", 0xd3, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="4eb647b0dab93224d8fa4fca865da1e3a61c09ac555489240eeb41eec9216569df86a6137de18fcbe8822b2f5a9851e54d3c3df4b39a1e6f21648cb5361519a552e4286605ce3d2c0c8a890b3eea93a9378d946dcf4bcf727864a8d68455389aedca8e9547656001760c1ea0317938a1d68a8858f928b650da0659c89c35d213876514533aa0af2ca143ca0293dc0beb5d33dd9153be66b45e4cb8529a08564e16e4447fb212dca95b22cfdb510ad3ce96bb2a5d5f270530f824a24f4ff824efe9a0b2e45372f009e3308504784d045c2600b04081352d07fb9150f4239e2a08c309c5489e6307b41f1332e29fd5acc9") (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYRES8=r1, @ANYRES64=r1], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x70) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000180)=0x1) (async) ioctl$TUNGETVNETLE(r2, 0x800454dd, &(0x7f00000001c0)) 23:31:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:18 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000100)={&(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)=""/214, 0xd6}}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x1ff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x18}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0x3, &(0x7f0000000600)=@raw=[@alu={0x7, 0x1, 0x6, 0x1, 0xb, 0x30, 0x1}, @exit, @exit], &(0x7f0000000640)='GPL\x00', 0x10000, 0xb3, &(0x7f0000000680)=""/179, 0x40f00, 0x8, '\x00', 0x0, 0x17, r2, 0x8, &(0x7f0000000740)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x0, 0x10, 0x8}, 0x10, r1, r4, 0x0, &(0x7f00000007c0)=[r4, 0xffffffffffffffff, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880)={0x0, r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x2, &(0x7f00000005c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000300)='GPL\x00', 0x400, 0x4e, &(0x7f0000000340)=""/78, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xa, 0x3, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r2, r3]}, 0x80) 23:31:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x1000000, 0x8d}, 0x20) 23:31:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0xffffffffffffffff]}, 0x80) 23:31:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x1000000, 0x8d}, 0x20) 23:31:18 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r1, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1]}, 0x80) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r1, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002bc0)=0xffffffffffffffff, 0x4) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) r9 = openat$cgroup_ro(r1, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r1, 0x3, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r2, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x13, 0x5, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xab}]}, &(0x7f0000001880)='GPL\x00', 0x3, 0x1000, &(0x7f00000018c0)=""/4096, 0x40f00, 0x11, '\x00', r6, 0x9, r7, 0x8, &(0x7f0000002c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002c40)={0x2, 0x5, 0x1, 0x50}, 0x10, 0x0, r8, 0x0, &(0x7f0000002fc0)=[r9, r10, r5, r11]}, 0x80) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x9, 0x8000, 0x40, 0xa9, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0x6}, 0x48) r13 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r13, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x80000001}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x4, 0x1, 0x6, 0x5, 0x2, 0x8, 0x10}]}, &(0x7f0000000140)='GPL\x00', 0x400, 0x38, &(0x7f00000001c0)=""/56, 0x41000, 0x1, '\x00', r6, 0x25, r0, 0x8, &(0x7f0000000200)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x3, 0x100, 0x500000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r12, r13]}, 0x80) 23:31:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:31:18 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000100)={&(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)=""/214, 0xd6}}, 0x10) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x1ff) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x18}, 0x10) (async) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0x3, &(0x7f0000000600)=@raw=[@alu={0x7, 0x1, 0x6, 0x1, 0xb, 0x30, 0x1}, @exit, @exit], &(0x7f0000000640)='GPL\x00', 0x10000, 0xb3, &(0x7f0000000680)=""/179, 0x40f00, 0x8, '\x00', 0x0, 0x17, r2, 0x8, &(0x7f0000000740)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x0, 0x10, 0x8}, 0x10, r1, r4, 0x0, &(0x7f00000007c0)=[r4, 0xffffffffffffffff, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880)={0x0, r5}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x2, &(0x7f00000005c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000300)='GPL\x00', 0x400, 0x4e, &(0x7f0000000340)=""/78, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xa, 0x3, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r2, r3]}, 0x80) [ 744.673672][ T1677] FAULT_INJECTION: forcing a failure. [ 744.673672][ T1677] name failslab, interval 1, probability 0, space 0, times 0 [ 744.722505][ T1677] CPU: 0 PID: 1677 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 744.732500][ T1677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 744.742395][ T1677] Call Trace: [ 744.745513][ T1677] [ 744.748297][ T1677] dump_stack_lvl+0x151/0x1b7 [ 744.752808][ T1677] ? bfq_pos_tree_add_move+0x43e/0x43e [ 744.758100][ T1677] dump_stack+0x15/0x17 [ 744.762093][ T1677] should_fail+0x3c0/0x510 [ 744.766342][ T1677] __should_failslab+0x9f/0xe0 [ 744.770941][ T1677] should_failslab+0x9/0x20 [ 744.775292][ T1677] kmem_cache_alloc+0x4f/0x2f0 [ 744.779883][ T1677] ? vm_area_dup+0x26/0x1d0 [ 744.784221][ T1677] vm_area_dup+0x26/0x1d0 [ 744.788392][ T1677] dup_mmap+0x6b8/0xea0 [ 744.792380][ T1677] ? __delayed_free_task+0x20/0x20 [ 744.797326][ T1677] ? mm_init+0x807/0x960 [ 744.801408][ T1677] dup_mm+0x91/0x330 [ 744.805138][ T1677] copy_mm+0x108/0x1b0 [ 744.809046][ T1677] copy_process+0x1295/0x3250 [ 744.813560][ T1677] ? proc_fail_nth_write+0x213/0x290 [ 744.818679][ T1677] ? proc_fail_nth_read+0x220/0x220 [ 744.823712][ T1677] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 744.828659][ T1677] ? vfs_write+0x9af/0x1050 [ 744.833000][ T1677] ? vmacache_update+0xb7/0x120 [ 744.837688][ T1677] kernel_clone+0x22d/0x990 [ 744.842029][ T1677] ? file_end_write+0x1b0/0x1b0 [ 744.846711][ T1677] ? __kasan_check_write+0x14/0x20 [ 744.851661][ T1677] ? create_io_thread+0x1e0/0x1e0 [ 744.856521][ T1677] ? __mutex_lock_slowpath+0x10/0x10 [ 744.861643][ T1677] __x64_sys_clone+0x289/0x310 [ 744.866243][ T1677] ? __do_sys_vfork+0x130/0x130 [ 744.870931][ T1677] ? debug_smp_processor_id+0x17/0x20 [ 744.876137][ T1677] do_syscall_64+0x44/0xd0 [ 744.880389][ T1677] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 744.886118][ T1677] RIP: 0033:0x7f14733430a9 [ 744.890379][ T1677] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 744.909812][ T1677] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:18 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 59) 23:31:18 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r1, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1]}, 0x80) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r1, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) (async) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002bc0)=0xffffffffffffffff, 0x4) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) (async) r9 = openat$cgroup_ro(r1, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async, rerun: 64) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r1, 0x3, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (rerun: 64) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r2, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x13, 0x5, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xab}]}, &(0x7f0000001880)='GPL\x00', 0x3, 0x1000, &(0x7f00000018c0)=""/4096, 0x40f00, 0x11, '\x00', r6, 0x9, r7, 0x8, &(0x7f0000002c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002c40)={0x2, 0x5, 0x1, 0x50}, 0x10, 0x0, r8, 0x0, &(0x7f0000002fc0)=[r9, r10, r5, r11]}, 0x80) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x9, 0x8000, 0x40, 0xa9, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0x6}, 0x48) (async) r13 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r13, &(0x7f0000003380), 0x2, 0x0) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x80000001}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x4, 0x1, 0x6, 0x5, 0x2, 0x8, 0x10}]}, &(0x7f0000000140)='GPL\x00', 0x400, 0x38, &(0x7f00000001c0)=""/56, 0x41000, 0x1, '\x00', r6, 0x25, r0, 0x8, &(0x7f0000000200)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x3, 0x100, 0x500000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r12, r13]}, 0x80) (rerun: 32) 23:31:18 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000100)={&(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)=""/214, 0xd6}}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x1ff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x18}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0x3, &(0x7f0000000600)=@raw=[@alu={0x7, 0x1, 0x6, 0x1, 0xb, 0x30, 0x1}, @exit, @exit], &(0x7f0000000640)='GPL\x00', 0x10000, 0xb3, &(0x7f0000000680)=""/179, 0x40f00, 0x8, '\x00', 0x0, 0x17, r2, 0x8, &(0x7f0000000740)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x0, 0x10, 0x8}, 0x10, r1, r4, 0x0, &(0x7f00000007c0)=[r4, 0xffffffffffffffff, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880)={0x0, r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x2, &(0x7f00000005c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000300)='GPL\x00', 0x400, 0x4e, &(0x7f0000000340)=""/78, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xa, 0x3, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r2, r3]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000100)={&(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)=""/214, 0xd6}}, 0x10) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x1ff) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x18}, 0x10) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0x3, &(0x7f0000000600)=@raw=[@alu={0x7, 0x1, 0x6, 0x1, 0xb, 0x30, 0x1}, @exit, @exit], &(0x7f0000000640)='GPL\x00', 0x10000, 0xb3, &(0x7f0000000680)=""/179, 0x40f00, 0x8, '\x00', 0x0, 0x17, r2, 0x8, &(0x7f0000000740)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x0, 0x10, 0x8}, 0x10, r1, r4, 0x0, &(0x7f00000007c0)=[r4, 0xffffffffffffffff, r3, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880)={0x0, r5}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x2, &(0x7f00000005c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000300)='GPL\x00', 0x400, 0x4e, &(0x7f0000000340)=""/78, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xa, 0x3, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r2, r3]}, 0x80) (async) 23:31:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/142, 0x5c, 0x8e, 0x1}, 0x20) 23:31:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 744.918059][ T1677] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 744.925868][ T1677] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 744.933678][ T1677] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 744.941492][ T1677] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 744.949302][ T1677] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 744.957116][ T1677] 23:31:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/142, 0x5c, 0x8e, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/142, 0x5c, 0x8e, 0x1}, 0x20) (async) 23:31:18 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r1, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1]}, 0x80) (async, rerun: 64) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (rerun: 64) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r1, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002bc0)=0xffffffffffffffff, 0x4) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) (async) r9 = openat$cgroup_ro(r1, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r1, 0x3, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r2, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x13, 0x5, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xab}]}, &(0x7f0000001880)='GPL\x00', 0x3, 0x1000, &(0x7f00000018c0)=""/4096, 0x40f00, 0x11, '\x00', r6, 0x9, r7, 0x8, &(0x7f0000002c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002c40)={0x2, 0x5, 0x1, 0x50}, 0x10, 0x0, r8, 0x0, &(0x7f0000002fc0)=[r9, r10, r5, r11]}, 0x80) (async, rerun: 32) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x9, 0x8000, 0x40, 0xa9, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0x6}, 0x48) (rerun: 32) r13 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r13, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x80000001}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x4, 0x1, 0x6, 0x5, 0x2, 0x8, 0x10}]}, &(0x7f0000000140)='GPL\x00', 0x400, 0x38, &(0x7f00000001c0)=""/56, 0x41000, 0x1, '\x00', r6, 0x25, r0, 0x8, &(0x7f0000000200)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x3, 0x100, 0x500000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r12, r13]}, 0x80) 23:31:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 745.013396][ T1723] FAULT_INJECTION: forcing a failure. [ 745.013396][ T1723] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 745.083180][ T1723] CPU: 1 PID: 1723 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 745.093173][ T1723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 745.103073][ T1723] Call Trace: [ 745.106195][ T1723] [ 745.108969][ T1723] dump_stack_lvl+0x151/0x1b7 [ 745.113483][ T1723] ? bfq_pos_tree_add_move+0x43e/0x43e [ 745.118780][ T1723] dump_stack+0x15/0x17 [ 745.122778][ T1723] should_fail+0x3c0/0x510 [ 745.127023][ T1723] should_fail_alloc_page+0x58/0x70 [ 745.132055][ T1723] __alloc_pages+0x1de/0x7c0 [ 745.136477][ T1723] ? __count_vm_events+0x30/0x30 [ 745.141259][ T1723] pte_alloc_one+0x73/0x1b0 [ 745.145591][ T1723] ? pfn_modify_allowed+0x2e0/0x2e0 [ 745.150624][ T1723] __pte_alloc+0x86/0x350 [ 745.154788][ T1723] ? is_module_text_address+0xe1/0x140 [ 745.160096][ T1723] ? free_pgtables+0x210/0x210 [ 745.164682][ T1723] ? __kernel_text_address+0x9a/0x110 [ 745.169901][ T1723] ? unwind_get_return_address+0x4c/0x90 [ 745.175358][ T1723] copy_pte_range+0x1b1f/0x20b0 [ 745.180046][ T1723] ? stack_trace_save+0x12d/0x1f0 [ 745.184912][ T1723] ? anon_vma_clone+0xa1/0x4f0 [ 745.189507][ T1723] ? __kunmap_atomic+0x80/0x80 [ 745.194108][ T1723] ? dup_mmap+0x750/0xea0 [ 745.198276][ T1723] ? dup_mm+0x91/0x330 [ 745.202180][ T1723] ? copy_mm+0x108/0x1b0 [ 745.206255][ T1723] ? copy_process+0x1295/0x3250 [ 745.210943][ T1723] ? kernel_clone+0x22d/0x990 [ 745.215486][ T1723] ? __x64_sys_clone+0x289/0x310 [ 745.220230][ T1723] ? do_syscall_64+0x44/0xd0 [ 745.224655][ T1723] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 745.230561][ T1723] copy_page_range+0xc1e/0x1090 [ 745.235387][ T1723] ? pfn_valid+0x1e0/0x1e0 [ 745.239635][ T1723] dup_mmap+0x99f/0xea0 [ 745.243635][ T1723] ? __delayed_free_task+0x20/0x20 [ 745.248572][ T1723] ? mm_init+0x807/0x960 [ 745.252651][ T1723] dup_mm+0x91/0x330 [ 745.256392][ T1723] copy_mm+0x108/0x1b0 [ 745.260289][ T1723] copy_process+0x1295/0x3250 [ 745.264808][ T1723] ? proc_fail_nth_write+0x213/0x290 [ 745.269926][ T1723] ? proc_fail_nth_read+0x220/0x220 [ 745.274960][ T1723] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 745.279907][ T1723] ? vfs_write+0x9af/0x1050 [ 745.284279][ T1723] ? vmacache_update+0xb7/0x120 [ 745.289022][ T1723] kernel_clone+0x22d/0x990 [ 745.293358][ T1723] ? file_end_write+0x1b0/0x1b0 [ 745.298041][ T1723] ? __kasan_check_write+0x14/0x20 [ 745.302990][ T1723] ? create_io_thread+0x1e0/0x1e0 [ 745.307854][ T1723] ? __mutex_lock_slowpath+0x10/0x10 [ 745.312972][ T1723] __x64_sys_clone+0x289/0x310 [ 745.317572][ T1723] ? __do_sys_vfork+0x130/0x130 [ 745.322260][ T1723] ? debug_smp_processor_id+0x17/0x20 [ 745.327469][ T1723] do_syscall_64+0x44/0xd0 [ 745.331721][ T1723] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 745.337446][ T1723] RIP: 0033:0x7f14733430a9 [ 745.341701][ T1723] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 745.361145][ T1723] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 745.369398][ T1723] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:18 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 60) 23:31:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/142, 0x5c, 0x8e, 0x1}, 0x20) 23:31:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x1000000, 0x8d, 0x1}, 0x20) 23:31:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r2, r2, r2, r3]}, 0x80) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x99f79f7719dc7cb}, 0x10) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="9500000000000000185300000dce69c7acd4925bf200000020b5050000080000d0034418", @ANYRES32=r0, @ANYBLOB="00000000000000008500000061000000"], &(0x7f00000001c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000200)=""/227, 0x40f00, 0x12, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x200, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x4, 0x3, 0xf439}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r2, r4, r5]}, 0x80) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f00000005c0), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000600)={[{0x2b, 'cpuacct'}, {0x2b, 'perf_event'}, {0x2b, 'rlimit'}, {0x2b, 'pids'}, {0x2b, 'net_cls'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2d, 'pids'}, {0x0, 'cpuacct'}]}, 0x4b) ioctl$TUNGETVNETLE(r6, 0x800454dd, &(0x7f00000004c0)) 23:31:18 executing program 5: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f00000001c0)="543f1761e2b32f93ef78acdc4d8f47ab4f2768ea5b0df493141a6a1c31acc1bd8e89a7433bdd80d549a2c1fc69dc2b2a453a37ed408fedc2c3d867c0b5ee9d4731704e43c7165257a4187e18fadcd7bbf4eb14f3381220fbd07b9e56fdf6dee3e10484f07b96d5ba3f6d252819cf1e828cbdddbcd1f77960314260e5a71f45bf18fef1c296c6792a8369b5b2121b158a51dd9764a605350f00156244f752742509be6dcf2f34b33d6244fc5e94"}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r2, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r1, 0x58, &(0x7f0000000280)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/136, 0x5c, 0x88}, 0x20) 23:31:18 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000002c0)={'b', ' *:* ', 'wm\x00'}, 0x9) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/201, 0xc9, 0x0, &(0x7f0000000000)=""/54, 0x36}}, 0x10) 23:31:18 executing program 5: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) (async, rerun: 32) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f00000001c0)="543f1761e2b32f93ef78acdc4d8f47ab4f2768ea5b0df493141a6a1c31acc1bd8e89a7433bdd80d549a2c1fc69dc2b2a453a37ed408fedc2c3d867c0b5ee9d4731704e43c7165257a4187e18fadcd7bbf4eb14f3381220fbd07b9e56fdf6dee3e10484f07b96d5ba3f6d252819cf1e828cbdddbcd1f77960314260e5a71f45bf18fef1c296c6792a8369b5b2121b158a51dd9764a605350f00156244f752742509be6dcf2f34b33d6244fc5e94"}, 0x20) (async, rerun: 32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r2, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r1, 0x58, &(0x7f0000000280)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/136, 0x5c, 0x88}, 0x20) 23:31:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 745.377198][ T1723] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 745.385009][ T1723] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 745.392819][ T1723] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 745.400633][ T1723] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 745.408446][ T1723] 23:31:18 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000002c0)={'b', ' *:* ', 'wm\x00'}, 0x9) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/201, 0xc9, 0x0, &(0x7f0000000000)=""/54, 0x36}}, 0x10) 23:31:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 745.449763][ T1748] FAULT_INJECTION: forcing a failure. [ 745.449763][ T1748] name failslab, interval 1, probability 0, space 0, times 0 [ 745.491819][ T1748] CPU: 1 PID: 1748 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 745.501819][ T1748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 745.511711][ T1748] Call Trace: [ 745.514834][ T1748] [ 745.517610][ T1748] dump_stack_lvl+0x151/0x1b7 [ 745.522123][ T1748] ? bfq_pos_tree_add_move+0x43e/0x43e [ 745.527416][ T1748] dump_stack+0x15/0x17 [ 745.531411][ T1748] should_fail+0x3c0/0x510 [ 745.535672][ T1748] __should_failslab+0x9f/0xe0 [ 745.540262][ T1748] should_failslab+0x9/0x20 [ 745.544596][ T1748] kmem_cache_alloc+0x4f/0x2f0 [ 745.549197][ T1748] ? vm_area_dup+0x26/0x1d0 [ 745.553536][ T1748] vm_area_dup+0x26/0x1d0 [ 745.557703][ T1748] dup_mmap+0x6b8/0xea0 [ 745.561696][ T1748] ? __delayed_free_task+0x20/0x20 [ 745.566642][ T1748] ? mm_init+0x807/0x960 [ 745.570722][ T1748] dup_mm+0x91/0x330 [ 745.574454][ T1748] copy_mm+0x108/0x1b0 [ 745.578358][ T1748] copy_process+0x1295/0x3250 [ 745.582874][ T1748] ? proc_fail_nth_write+0x213/0x290 [ 745.587994][ T1748] ? proc_fail_nth_read+0x220/0x220 [ 745.593030][ T1748] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 745.597974][ T1748] ? vfs_write+0x9af/0x1050 [ 745.602315][ T1748] ? vmacache_update+0xb7/0x120 [ 745.607006][ T1748] kernel_clone+0x22d/0x990 [ 745.611341][ T1748] ? file_end_write+0x1b0/0x1b0 [ 745.616029][ T1748] ? __kasan_check_write+0x14/0x20 [ 745.620975][ T1748] ? create_io_thread+0x1e0/0x1e0 [ 745.625838][ T1748] ? __mutex_lock_slowpath+0x10/0x10 [ 745.630956][ T1748] __x64_sys_clone+0x289/0x310 [ 745.635557][ T1748] ? __do_sys_vfork+0x130/0x130 [ 745.640243][ T1748] ? debug_smp_processor_id+0x17/0x20 [ 745.645452][ T1748] do_syscall_64+0x44/0xd0 [ 745.649705][ T1748] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 745.655430][ T1748] RIP: 0033:0x7f14733430a9 [ 745.659687][ T1748] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 745.679133][ T1748] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:19 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 61) 23:31:19 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1c, 0x200, 0xfffffa5f, 0x0, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x5, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39d1, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x48}]}, &(0x7f0000000140)='GPL\x00', 0xd9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0x2, 0x7ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r5]}, 0x80) 23:31:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:19 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000002c0)={'b', ' *:* ', 'wm\x00'}, 0x9) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/201, 0xc9, 0x0, &(0x7f0000000000)=""/54, 0x36}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000002c0)={'b', ' *:* ', 'wm\x00'}, 0x9) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/201, 0xc9, 0x0, &(0x7f0000000000)=""/54, 0x36}}, 0x10) (async) 23:31:19 executing program 5: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f00000001c0)="543f1761e2b32f93ef78acdc4d8f47ab4f2768ea5b0df493141a6a1c31acc1bd8e89a7433bdd80d549a2c1fc69dc2b2a453a37ed408fedc2c3d867c0b5ee9d4731704e43c7165257a4187e18fadcd7bbf4eb14f3381220fbd07b9e56fdf6dee3e10484f07b96d5ba3f6d252819cf1e828cbdddbcd1f77960314260e5a71f45bf18fef1c296c6792a8369b5b2121b158a51dd9764a605350f00156244f752742509be6dcf2f34b33d6244fc5e94"}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r2, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r1, 0x58, &(0x7f0000000280)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/136, 0x5c, 0x88}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f00000001c0)="543f1761e2b32f93ef78acdc4d8f47ab4f2768ea5b0df493141a6a1c31acc1bd8e89a7433bdd80d549a2c1fc69dc2b2a453a37ed408fedc2c3d867c0b5ee9d4731704e43c7165257a4187e18fadcd7bbf4eb14f3381220fbd07b9e56fdf6dee3e10484f07b96d5ba3f6d252819cf1e828cbdddbcd1f77960314260e5a71f45bf18fef1c296c6792a8369b5b2121b158a51dd9764a605350f00156244f752742509be6dcf2f34b33d6244fc5e94"}, 0x20) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_type(r2, &(0x7f0000000140), 0x2, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r1, 0x58, &(0x7f0000000280)}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/136, 0x5c, 0x88}, 0x20) (async) 23:31:19 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b8100000000183a000000000000000000000000000018350000000000000000868f38ac496cd853e2d6a275000000000000181400"/80, @ANYRES32, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x6, 0x668a, 0xbd7, 0x8, 0x1100, 0x1, 0x531db644, '\x00', 0x0, r2, 0x3, 0x4, 0x3}, 0x48) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) recvmsg$unix(r2, &(0x7f0000000680)={&(0x7f0000000500), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000580)=""/53, 0x35}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/1, 0x1}, {&(0x7f00000033c0)=""/4096, 0x1000}], 0x4, &(0x7f0000000640)=[@cred={{0x1c}}], 0x20}, 0x10010) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x1d8, 0x800, 0x3, 0x110, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x5, 0x3, 0xd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x401, 0x7, 0x7fffffff, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x2, 0x2, 0x0, 0x4}, 0x48) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffff8}, @alu={0x4, 0x0, 0x2, 0x6, 0x5, 0x97, 0xffffffffffffffff}, @generic={0xfe, 0x5, 0x5, 0x1ff, 0x100}]}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0x3a, &(0x7f0000000140)=""/58, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x0, 0x1f, 0xfffff001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0x1, r5, r6]}, 0x80) 23:31:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xf, 0x7, 0x5, 0x8, 0x1839, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000080000000000000cf0c00008500000023000000186900000e00000000000000ff0100009402ffff010000001832000004000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000ca0d7d293e82b4596f39581cb0487e238d85087ec9c8f190486f8b20c886ec5c592ac1ba58c86659cd5ac63009020bf3c2aee09f0000000000f1ec0480facacd3def93b145d5e44e77d18f119325e09b3329d67db142d66fa817f2f21d64bb9f59590f74c21c6546dd3b4098e45bbdf25960", @ANYRES32=r1, @ANYBLOB="000000000000000077a00800ff0300009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x6, 0xc4, &(0x7f00000001c0)=""/196, 0x41100, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x0, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r3]}, 0x80) 23:31:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 745.687386][ T1748] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 745.695188][ T1748] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 745.702995][ T1748] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 745.710805][ T1748] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 745.718616][ T1748] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 745.726605][ T1748] 23:31:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018e70400e09c33f5ea14119d206e49584b5f41293cc60a23a59f8de87ff2218b56c4b6d9810720343fa4500e2c470f118a848a08dd51a07a105799d3d9675383a3e434b6a1ec8c60e3fffea5f5ea9108ed504ae4cb01785148c8697c2f466fc539fa675fca90e1fe39af016f0145e6734503f5f7c2f75c77cfa3eb951bb5bee8283103"], &(0x7f0000000080)=""/141, 0x5c, 0xfffffe05, 0x1}, 0x20) 23:31:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 745.771478][ T1783] FAULT_INJECTION: forcing a failure. [ 745.771478][ T1783] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 745.788716][ T1783] CPU: 1 PID: 1783 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 745.798715][ T1783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 745.808868][ T1783] Call Trace: [ 745.811992][ T1783] [ 745.814783][ T1783] dump_stack_lvl+0x151/0x1b7 [ 745.819295][ T1783] ? bfq_pos_tree_add_move+0x43e/0x43e [ 745.824579][ T1783] dump_stack+0x15/0x17 [ 745.828571][ T1783] should_fail+0x3c0/0x510 [ 745.832830][ T1783] should_fail_alloc_page+0x58/0x70 [ 745.837855][ T1783] __alloc_pages+0x1de/0x7c0 [ 745.842289][ T1783] ? __count_vm_events+0x30/0x30 [ 745.847058][ T1783] ? __this_cpu_preempt_check+0x13/0x20 [ 745.852436][ T1783] ? __mod_node_page_state+0xac/0xf0 [ 745.857555][ T1783] ? __mod_lruvec_page_state+0x15f/0x1c0 [ 745.863022][ T1783] pte_alloc_one+0x73/0x1b0 [ 745.867362][ T1783] ? pfn_modify_allowed+0x2e0/0x2e0 [ 745.872395][ T1783] __pte_alloc+0x86/0x350 [ 745.876560][ T1783] ? free_pgtables+0x210/0x210 [ 745.881160][ T1783] ? _raw_spin_lock+0xa3/0x1b0 [ 745.885759][ T1783] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 745.890968][ T1783] ? unwind_get_return_address+0x4c/0x90 [ 745.896438][ T1783] copy_pte_range+0x1b1f/0x20b0 [ 745.901125][ T1783] ? stack_trace_save+0x12d/0x1f0 [ 745.905984][ T1783] ? anon_vma_clone+0xa1/0x4f0 [ 745.910584][ T1783] ? __kunmap_atomic+0x80/0x80 [ 745.915182][ T1783] ? dup_mmap+0x750/0xea0 [ 745.919349][ T1783] ? copy_mm+0x108/0x1b0 [ 745.923428][ T1783] ? copy_process+0x1295/0x3250 [ 745.928122][ T1783] ? kernel_clone+0x22d/0x990 [ 745.932629][ T1783] ? __x64_sys_clone+0x289/0x310 [ 745.937403][ T1783] ? do_syscall_64+0x44/0xd0 [ 745.941827][ T1783] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 745.947733][ T1783] copy_page_range+0xc1e/0x1090 [ 745.952420][ T1783] ? pfn_valid+0x1e0/0x1e0 [ 745.956681][ T1783] dup_mmap+0x99f/0xea0 [ 745.960664][ T1783] ? __delayed_free_task+0x20/0x20 [ 745.965608][ T1783] ? mm_init+0x807/0x960 [ 745.969690][ T1783] dup_mm+0x91/0x330 [ 745.973426][ T1783] copy_mm+0x108/0x1b0 [ 745.977326][ T1783] copy_process+0x1295/0x3250 [ 745.981979][ T1783] ? proc_fail_nth_write+0x213/0x290 [ 745.987143][ T1783] ? proc_fail_nth_read+0x220/0x220 [ 745.992168][ T1783] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 745.997117][ T1783] ? vfs_write+0x9af/0x1050 [ 746.001844][ T1783] ? vmacache_update+0xb7/0x120 [ 746.006532][ T1783] kernel_clone+0x22d/0x990 [ 746.010868][ T1783] ? file_end_write+0x1b0/0x1b0 [ 746.015560][ T1783] ? __kasan_check_write+0x14/0x20 [ 746.020510][ T1783] ? create_io_thread+0x1e0/0x1e0 [ 746.025367][ T1783] ? __mutex_lock_slowpath+0x10/0x10 [ 746.030486][ T1783] __x64_sys_clone+0x289/0x310 [ 746.035088][ T1783] ? __do_sys_vfork+0x130/0x130 [ 746.039772][ T1783] ? debug_smp_processor_id+0x17/0x20 [ 746.044979][ T1783] do_syscall_64+0x44/0xd0 [ 746.049238][ T1783] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 746.054960][ T1783] RIP: 0033:0x7f14733430a9 [ 746.059218][ T1783] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 746.078664][ T1783] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 746.086900][ T1783] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 746.094715][ T1783] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 746.102528][ T1783] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 746.110335][ T1783] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:19 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62) 23:31:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018e70400e09c33f5ea14119d206e49584b5f41293cc60a23a59f8de87ff2218b56c4b6d9810720343fa4500e2c470f118a848a08dd51a07a105799d3d9675383a3e434b6a1ec8c60e3fffea5f5ea9108ed504ae4cb01785148c8697c2f466fc539fa675fca90e1fe39af016f0145e6734503f5f7c2f75c77cfa3eb951bb5bee8283103"], &(0x7f0000000080)=""/141, 0x5c, 0xfffffe05, 0x1}, 0x20) 23:31:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xf, 0x7, 0x5, 0x8, 0x1839, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000080000000000000cf0c00008500000023000000186900000e00000000000000ff0100009402ffff010000001832000004000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000ca0d7d293e82b4596f39581cb0487e238d85087ec9c8f190486f8b20c886ec5c592ac1ba58c86659cd5ac63009020bf3c2aee09f0000000000f1ec0480facacd3def93b145d5e44e77d18f119325e09b3329d67db142d66fa817f2f21d64bb9f59590f74c21c6546dd3b4098e45bbdf25960", @ANYRES32=r1, @ANYBLOB="000000000000000077a00800ff0300009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x6, 0xc4, &(0x7f00000001c0)=""/196, 0x41100, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x0, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r3]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xf, 0x7, 0x5, 0x8, 0x1839, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000080000000000000cf0c00008500000023000000186900000e00000000000000ff0100009402ffff010000001832000004000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000ca0d7d293e82b4596f39581cb0487e238d85087ec9c8f190486f8b20c886ec5c592ac1ba58c86659cd5ac63009020bf3c2aee09f0000000000f1ec0480facacd3def93b145d5e44e77d18f119325e09b3329d67db142d66fa817f2f21d64bb9f59590f74c21c6546dd3b4098e45bbdf25960", @ANYRES32=r1, @ANYBLOB="000000000000000077a00800ff0300009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x6, 0xc4, &(0x7f00000001c0)=""/196, 0x41100, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x0, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r3]}, 0x80) (async) 23:31:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018e70400e09c33f5ea14119d206e49584b5f41293cc60a23a59f8de87ff2218b56c4b6d9810720343fa4500e2c470f118a848a08dd51a07a105799d3d9675383a3e434b6a1ec8c60e3fffea5f5ea9108ed504ae4cb01785148c8697c2f466fc539fa675fca90e1fe39af016f0145e6734503f5f7c2f75c77cfa3eb951bb5bee8283103"], &(0x7f0000000080)=""/141, 0x5c, 0xfffffe05, 0x1}, 0x20) 23:31:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xf, 0x7, 0x5, 0x8, 0x1839, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000080000000000000cf0c00008500000023000000186900000e00000000000000ff0100009402ffff010000001832000004000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000ca0d7d293e82b4596f39581cb0487e238d85087ec9c8f190486f8b20c886ec5c592ac1ba58c86659cd5ac63009020bf3c2aee09f0000000000f1ec0480facacd3def93b145d5e44e77d18f119325e09b3329d67db142d66fa817f2f21d64bb9f59590f74c21c6546dd3b4098e45bbdf25960", @ANYRES32=r1, @ANYBLOB="000000000000000077a00800ff0300009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x6, 0xc4, &(0x7f00000001c0)=""/196, 0x41100, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x0, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r3]}, 0x80) 23:31:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 746.118145][ T1783] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 746.125959][ T1783] [ 746.148503][ T1802] FAULT_INJECTION: forcing a failure. [ 746.148503][ T1802] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:31:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 746.172043][ T1802] CPU: 1 PID: 1802 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 746.182044][ T1802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 746.191931][ T1802] Call Trace: [ 746.195057][ T1802] [ 746.197835][ T1802] dump_stack_lvl+0x151/0x1b7 [ 746.202347][ T1802] ? bfq_pos_tree_add_move+0x43e/0x43e [ 746.207652][ T1802] dump_stack+0x15/0x17 [ 746.211636][ T1802] should_fail+0x3c0/0x510 [ 746.215888][ T1802] should_fail_alloc_page+0x58/0x70 [ 746.220920][ T1802] __alloc_pages+0x1de/0x7c0 [ 746.225349][ T1802] ? __count_vm_events+0x30/0x30 [ 746.230140][ T1802] ? __this_cpu_preempt_check+0x13/0x20 [ 746.235498][ T1802] ? __mod_node_page_state+0xac/0xf0 [ 746.240630][ T1802] pte_alloc_one+0x73/0x1b0 [ 746.244961][ T1802] ? pfn_modify_allowed+0x2e0/0x2e0 [ 746.249997][ T1802] __pte_alloc+0x86/0x350 [ 746.254163][ T1802] ? free_pgtables+0x210/0x210 [ 746.258762][ T1802] ? _raw_spin_lock+0xa3/0x1b0 [ 746.263363][ T1802] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 746.268581][ T1802] ? __kernel_text_address+0x9a/0x110 [ 746.273782][ T1802] copy_pte_range+0x1b1f/0x20b0 [ 746.278461][ T1802] ? __kunmap_atomic+0x80/0x80 [ 746.283059][ T1802] ? __kasan_slab_alloc+0xc4/0xe0 [ 746.287921][ T1802] ? __kasan_slab_alloc+0xb2/0xe0 [ 746.292780][ T1802] ? kmem_cache_alloc+0x189/0x2f0 [ 746.297638][ T1802] ? vm_area_dup+0x26/0x1d0 [ 746.301978][ T1802] ? dup_mmap+0x6b8/0xea0 [ 746.306144][ T1802] ? dup_mm+0x91/0x330 [ 746.310049][ T1802] ? copy_mm+0x108/0x1b0 [ 746.314129][ T1802] ? copy_process+0x1295/0x3250 [ 746.318817][ T1802] ? kernel_clone+0x22d/0x990 [ 746.323329][ T1802] ? __x64_sys_clone+0x289/0x310 [ 746.328102][ T1802] ? do_syscall_64+0x44/0xd0 [ 746.332528][ T1802] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 746.338435][ T1802] copy_page_range+0xc1e/0x1090 [ 746.343126][ T1802] ? pfn_valid+0x1e0/0x1e0 [ 746.347374][ T1802] dup_mmap+0x99f/0xea0 [ 746.351365][ T1802] ? __delayed_free_task+0x20/0x20 [ 746.356311][ T1802] ? mm_init+0x807/0x960 [ 746.360390][ T1802] dup_mm+0x91/0x330 [ 746.364123][ T1802] copy_mm+0x108/0x1b0 [ 746.368031][ T1802] copy_process+0x1295/0x3250 [ 746.372542][ T1802] ? proc_fail_nth_write+0x213/0x290 [ 746.377663][ T1802] ? proc_fail_nth_read+0x220/0x220 [ 746.382700][ T1802] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 746.387646][ T1802] ? vfs_write+0x9af/0x1050 [ 746.391983][ T1802] ? vmacache_update+0xb7/0x120 [ 746.396681][ T1802] kernel_clone+0x22d/0x990 [ 746.401012][ T1802] ? file_end_write+0x1b0/0x1b0 [ 746.405698][ T1802] ? __kasan_check_write+0x14/0x20 [ 746.410645][ T1802] ? create_io_thread+0x1e0/0x1e0 [ 746.415511][ T1802] ? __mutex_lock_slowpath+0x10/0x10 [ 746.420627][ T1802] __x64_sys_clone+0x289/0x310 [ 746.425229][ T1802] ? __do_sys_vfork+0x130/0x130 [ 746.429913][ T1802] ? debug_smp_processor_id+0x17/0x20 [ 746.435128][ T1802] do_syscall_64+0x44/0xd0 [ 746.439375][ T1802] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 746.445100][ T1802] RIP: 0033:0x7f14733430a9 [ 746.449356][ T1802] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:31:20 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) 23:31:20 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x7, 0x1ff, 0x723a, 0x10, 0x1, 0xffffffa6, '\x00', 0x0, r0, 0x2, 0x3, 0x3, 0xe}, 0x48) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r2, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r2, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000001840)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) openat$cgroup_ro(r2, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r2, 0x3, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000001680), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001740)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000600)=@raw=[@exit, @ldst={0x2, 0x1, 0x3, 0x5, 0xb, 0x100, 0xfffffffffffffff0}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x6}], &(0x7f0000000640)='syzkaller\x00', 0x1f, 0x1000, &(0x7f0000000680)=""/4096, 0x41100, 0x5, '\x00', r3, 0x17, r6, 0x8, &(0x7f00000016c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001700)={0x5, 0x4, 0xfffffff9, 0x2482be43}, 0x10, 0x1245e}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r7, 0x20, &(0x7f0000000500)={&(0x7f0000000440)=""/106, 0x6a, 0x0, &(0x7f00000004c0)=""/19, 0x13}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x7, 0x8, 0x0, 0x80, r0, 0xe134, '\x00', 0x0, r0, 0x2, 0x2, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="852000000500000018000000953d5515a8ec2b56d904020010000000000000680d0000182b000003"], &(0x7f00000001c0)='GPL\x00', 0x1000, 0x95, &(0x7f0000000200)=""/149, 0x40e00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0xb, 0x0, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r8]}, 0x80) 23:31:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 23:31:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) r2 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000640)={r1, 0x0, 0x25, 0x10}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000680)=r2, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b81000000007a8d09100000000000183a00000000000000000000000000001835000000000000000000000000220018147c13", @ANYRES32, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/91, 0x5b, 0x0, &(0x7f0000000240)=""/175, 0xaf}}, 0x10) 23:31:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 23:31:20 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x7, 0x1ff, 0x723a, 0x10, 0x1, 0xffffffa6, '\x00', 0x0, r0, 0x2, 0x3, 0x3, 0xe}, 0x48) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r2, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r2, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000001840)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) openat$cgroup_ro(r2, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r2, 0x3, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000001680), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001740)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000600)=@raw=[@exit, @ldst={0x2, 0x1, 0x3, 0x5, 0xb, 0x100, 0xfffffffffffffff0}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x6}], &(0x7f0000000640)='syzkaller\x00', 0x1f, 0x1000, &(0x7f0000000680)=""/4096, 0x41100, 0x5, '\x00', r3, 0x17, r6, 0x8, &(0x7f00000016c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001700)={0x5, 0x4, 0xfffffff9, 0x2482be43}, 0x10, 0x1245e}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r7, 0x20, &(0x7f0000000500)={&(0x7f0000000440)=""/106, 0x6a, 0x0, &(0x7f00000004c0)=""/19, 0x13}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x7, 0x8, 0x0, 0x80, r0, 0xe134, '\x00', 0x0, r0, 0x2, 0x2, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="852000000500000018000000953d5515a8ec2b56d904020010000000000000680d0000182b000003"], &(0x7f00000001c0)='GPL\x00', 0x1000, 0x95, &(0x7f0000000200)=""/149, 0x40e00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0xb, 0x0, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r8]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x7, 0x1ff, 0x723a, 0x10, 0x1, 0xffffffa6, '\x00', 0x0, r0, 0x2, 0x3, 0x3, 0xe}, 0x48) (async) bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) (async) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r2, 0x58, &(0x7f0000001380)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r2, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000001840)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) (async) openat$cgroup_ro(r2, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r2, 0x3, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) bpf$ITER_CREATE(0x21, &(0x7f0000001680), 0x8) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001740)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000600)=@raw=[@exit, @ldst={0x2, 0x1, 0x3, 0x5, 0xb, 0x100, 0xfffffffffffffff0}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x6}], &(0x7f0000000640)='syzkaller\x00', 0x1f, 0x1000, &(0x7f0000000680)=""/4096, 0x41100, 0x5, '\x00', r3, 0x17, r6, 0x8, &(0x7f00000016c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001700)={0x5, 0x4, 0xfffffff9, 0x2482be43}, 0x10, 0x1245e}, 0x80) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r7, 0x20, &(0x7f0000000500)={&(0x7f0000000440)=""/106, 0x6a, 0x0, &(0x7f00000004c0)=""/19, 0x13}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x7, 0x8, 0x0, 0x80, r0, 0xe134, '\x00', 0x0, r0, 0x2, 0x2, 0x0, 0x1}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="852000000500000018000000953d5515a8ec2b56d904020010000000000000680d0000182b000003"], &(0x7f00000001c0)='GPL\x00', 0x1000, 0x95, &(0x7f0000000200)=""/149, 0x40e00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0xb, 0x0, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r8]}, 0x80) (async) 23:31:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x1, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 746.468806][ T1802] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 746.477043][ T1802] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 746.484853][ T1802] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 746.492664][ T1802] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 746.500476][ T1802] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 746.508293][ T1802] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 746.516113][ T1802] 23:31:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) r2 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000640)={r1, 0x0, 0x25, 0x10}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000680)=r2, 0x4) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b81000000007a8d09100000000000183a00000000000000000000000000001835000000000000000000000000220018147c13", @ANYRES32, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/91, 0x5b, 0x0, &(0x7f0000000240)=""/175, 0xaf}}, 0x10) 23:31:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x1, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 746.561199][ T1844] FAULT_INJECTION: forcing a failure. [ 746.561199][ T1844] name failslab, interval 1, probability 0, space 0, times 0 [ 746.575968][ T1844] CPU: 0 PID: 1844 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 746.585956][ T1844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 746.595847][ T1844] Call Trace: [ 746.598973][ T1844] [ 746.601750][ T1844] dump_stack_lvl+0x151/0x1b7 23:31:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 746.606264][ T1844] ? bfq_pos_tree_add_move+0x43e/0x43e [ 746.611569][ T1844] dump_stack+0x15/0x17 [ 746.615553][ T1844] should_fail+0x3c0/0x510 [ 746.619807][ T1844] __should_failslab+0x9f/0xe0 [ 746.624403][ T1844] should_failslab+0x9/0x20 [ 746.628742][ T1844] kmem_cache_alloc+0x4f/0x2f0 [ 746.633345][ T1844] ? anon_vma_clone+0xa1/0x4f0 [ 746.637976][ T1844] anon_vma_clone+0xa1/0x4f0 [ 746.642368][ T1844] anon_vma_fork+0x91/0x4f0 [ 746.646712][ T1844] ? anon_vma_name+0x43/0x70 [ 746.651130][ T1844] dup_mmap+0x750/0xea0 [ 746.655124][ T1844] ? __delayed_free_task+0x20/0x20 [ 746.660068][ T1844] ? mm_init+0x807/0x960 [ 746.664149][ T1844] dup_mm+0x91/0x330 [ 746.667884][ T1844] copy_mm+0x108/0x1b0 [ 746.671788][ T1844] copy_process+0x1295/0x3250 [ 746.676301][ T1844] ? proc_fail_nth_write+0x213/0x290 [ 746.681420][ T1844] ? proc_fail_nth_read+0x220/0x220 [ 746.686630][ T1844] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 746.691577][ T1844] ? vfs_write+0x9af/0x1050 [ 746.695931][ T1844] ? vmacache_update+0xb7/0x120 [ 746.700601][ T1844] kernel_clone+0x22d/0x990 [ 746.704953][ T1844] ? file_end_write+0x1b0/0x1b0 [ 746.709630][ T1844] ? __kasan_check_write+0x14/0x20 [ 746.714575][ T1844] ? create_io_thread+0x1e0/0x1e0 [ 746.719437][ T1844] ? __mutex_lock_slowpath+0x10/0x10 [ 746.724557][ T1844] __x64_sys_clone+0x289/0x310 [ 746.729163][ T1844] ? __do_sys_vfork+0x130/0x130 [ 746.733845][ T1844] ? debug_smp_processor_id+0x17/0x20 [ 746.739052][ T1844] do_syscall_64+0x44/0xd0 [ 746.743302][ T1844] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 746.749034][ T1844] RIP: 0033:0x7f14733430a9 [ 746.753288][ T1844] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 746.772735][ T1844] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 746.781061][ T1844] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 746.788894][ T1844] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 746.796768][ T1844] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 746.804580][ T1844] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:20 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) 23:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) r2 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000640)={r1, 0x0, 0x25, 0x10}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000680)=r2, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b81000000007a8d09100000000000183a00000000000000000000000000001835000000000000000000000000220018147c13", @ANYRES32, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/91, 0x5b, 0x0, &(0x7f0000000240)=""/175, 0xaf}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000640)={r1, 0x0, 0x25, 0x10}, 0x10) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000680)=r2, 0x4) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b81000000007a8d09100000000000183a00000000000000000000000000001835000000000000000000000000220018147c13", @ANYRES32, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300), 0x4) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/91, 0x5b, 0x0, &(0x7f0000000240)=""/175, 0xaf}}, 0x10) (async) 23:31:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x1, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0x9c}], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:20 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x7, 0x1ff, 0x723a, 0x10, 0x1, 0xffffffa6, '\x00', 0x0, r0, 0x2, 0x3, 0x3, 0xe}, 0x48) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r2, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r2, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000001840)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b8100000000008d09100000000000183a0000030000000000a40000000000183706dc4b11612228a2b90c1e51300f2f71071537ce87e8dbb88c5f8135000000010000000000181400009747050738f5960900000000000000fe3312f7254a07ebb47432d7b07bdbca06082b2f1b74c5210000009831971739a7493517030b866d98ae2286c77f0ca8e5c37377cb9ca0b39ba373d558dc01b3cf8a7c7a5af56cb5c261a43dbcef27dd88798941126a772da5a230a5470364b98cd1e5c477cc61f6871e68c6492b79e6f5f3f595445389f52a58f72164bd18ef21593196ae282a784d699717b1abf73e355501899ed389fe0516040a7b736c22c125c053f0d4d78b0105189d9d4c6b3553e324fb9a391d67739981b5a3f1ba16a50af0fb6831c07508a8bfa8dabf2ff7a7b3c9981441fdadd2ad90be4248ad3093db030821c7e7868705e4f9eeec143c9be5221def3d88e3ca622a0e937cb4e900d6915649366fc7cc2f747045f0c1dcbdc751dbdaf95e9c90d6cb924ed6c824c3cef4fe23a992039d9e2fc5042dc285ffecf644a273354d0b5299774dbf10871d579cbd46664469485301d18f546ec2d05a8c624dd23e533333cc0dee7b895755143d3648349e73ad67eabe0de7a2c9a5a8c775517d79eec1e87face1e4b3d599ea649f0000000000", @ANYRES32=r2, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) openat$cgroup_ro(r2, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r2, 0x3, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000001680), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001740)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000600)=@raw=[@exit, @ldst={0x2, 0x1, 0x3, 0x5, 0xb, 0x100, 0xfffffffffffffff0}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x6}], &(0x7f0000000640)='syzkaller\x00', 0x1f, 0x1000, &(0x7f0000000680)=""/4096, 0x41100, 0x5, '\x00', r3, 0x17, r6, 0x8, &(0x7f00000016c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001700)={0x5, 0x4, 0xfffffff9, 0x2482be43}, 0x10, 0x1245e}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r7, 0x20, &(0x7f0000000500)={&(0x7f0000000440)=""/106, 0x6a, 0x0, &(0x7f00000004c0)=""/19, 0x13}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x7, 0x8, 0x0, 0x80, r0, 0xe134, '\x00', 0x0, r0, 0x2, 0x2, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="852000000500000018000000953d5515a8ec2b56d904020010000000000000680d0000182b000003"], &(0x7f00000001c0)='GPL\x00', 0x1000, 0x95, &(0x7f0000000200)=""/149, 0x40e00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0xb, 0x0, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r8]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x7, 0x1ff, 0x723a, 0x10, 0x1, 0xffffffa6, '\x00', 0x0, r0, 0x2, 0x3, 0x3, 0xe}, 0x48) (async) bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) (async) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r2, 0x58, &(0x7f0000001380)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r3, 0x0, r2, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r2, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000001840)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300000000000000000000009500000000000000"], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) (async) openat$cgroup_ro(r2, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r2, 0x3, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) bpf$ITER_CREATE(0x21, &(0x7f0000001680), 0x8) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001740)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000600)=@raw=[@exit, @ldst={0x2, 0x1, 0x3, 0x5, 0xb, 0x100, 0xfffffffffffffff0}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x6}], &(0x7f0000000640)='syzkaller\x00', 0x1f, 0x1000, &(0x7f0000000680)=""/4096, 0x41100, 0x5, '\x00', r3, 0x17, r6, 0x8, &(0x7f00000016c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001700)={0x5, 0x4, 0xfffffff9, 0x2482be43}, 0x10, 0x1245e}, 0x80) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r7, 0x20, &(0x7f0000000500)={&(0x7f0000000440)=""/106, 0x6a, 0x0, &(0x7f00000004c0)=""/19, 0x13}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x7, 0x8, 0x0, 0x80, r0, 0xe134, '\x00', 0x0, r0, 0x2, 0x2, 0x0, 0x1}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="852000000500000018000000953d5515a8ec2b56d904020010000000000000680d0000182b000003"], &(0x7f00000001c0)='GPL\x00', 0x1000, 0x95, &(0x7f0000000200)=""/149, 0x40e00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0xb, 0x0, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r8]}, 0x80) (async) 23:31:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 746.812392][ T1844] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 746.820205][ T1844] 23:31:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:20 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0xc, 0x2, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x1, 0xa, 0x7, 0x8, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x6b, &(0x7f0000000080)=""/107, 0x41100, 0x4, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0xe, 0x7fff, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x1, 0x1]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[], &(0x7f00000001c0)=""/157, 0x5c, 0x9d, 0x1}, 0x20) [ 746.854887][ T1891] FAULT_INJECTION: forcing a failure. [ 746.854887][ T1891] name failslab, interval 1, probability 0, space 0, times 0 [ 746.872791][ T1891] CPU: 0 PID: 1891 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 746.882781][ T1891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 746.892674][ T1891] Call Trace: [ 746.895796][ T1891] [ 746.898573][ T1891] dump_stack_lvl+0x151/0x1b7 23:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:20 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0xc, 0x2, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x1, 0xa, 0x7, 0x8, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x6b, &(0x7f0000000080)=""/107, 0x41100, 0x4, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0xe, 0x7fff, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x1, 0x1]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[], &(0x7f00000001c0)=""/157, 0x5c, 0x9d, 0x1}, 0x20) [ 746.903088][ T1891] ? bfq_pos_tree_add_move+0x43e/0x43e [ 746.908383][ T1891] ? do_syscall_64+0x44/0xd0 [ 746.912816][ T1891] dump_stack+0x15/0x17 [ 746.916810][ T1891] should_fail+0x3c0/0x510 [ 746.921054][ T1891] __should_failslab+0x9f/0xe0 [ 746.925663][ T1891] should_failslab+0x9/0x20 [ 746.929995][ T1891] kmem_cache_alloc+0x4f/0x2f0 [ 746.934601][ T1891] ? anon_vma_clone+0xa1/0x4f0 [ 746.939192][ T1891] anon_vma_clone+0xa1/0x4f0 [ 746.943620][ T1891] anon_vma_fork+0x91/0x4f0 [ 746.948062][ T1891] ? anon_vma_name+0x43/0x70 [ 746.952470][ T1891] dup_mmap+0x750/0xea0 [ 746.956472][ T1891] ? __delayed_free_task+0x20/0x20 [ 746.961418][ T1891] ? mm_init+0x807/0x960 [ 746.965490][ T1891] dup_mm+0x91/0x330 [ 746.969221][ T1891] copy_mm+0x108/0x1b0 [ 746.973122][ T1891] copy_process+0x1295/0x3250 [ 746.977635][ T1891] ? proc_fail_nth_write+0x213/0x290 [ 746.982756][ T1891] ? proc_fail_nth_read+0x220/0x220 [ 746.987795][ T1891] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 746.992740][ T1891] ? vfs_write+0x9af/0x1050 [ 746.997076][ T1891] ? vmacache_update+0xb7/0x120 [ 747.001765][ T1891] kernel_clone+0x22d/0x990 [ 747.006105][ T1891] ? file_end_write+0x1b0/0x1b0 [ 747.010789][ T1891] ? __kasan_check_write+0x14/0x20 [ 747.015826][ T1891] ? create_io_thread+0x1e0/0x1e0 [ 747.020685][ T1891] ? __mutex_lock_slowpath+0x10/0x10 [ 747.025806][ T1891] __x64_sys_clone+0x289/0x310 [ 747.030409][ T1891] ? __do_sys_vfork+0x130/0x130 [ 747.035094][ T1891] ? debug_smp_processor_id+0x17/0x20 [ 747.040301][ T1891] do_syscall_64+0x44/0xd0 [ 747.044553][ T1891] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 747.050282][ T1891] RIP: 0033:0x7f14733430a9 [ 747.054537][ T1891] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 747.073982][ T1891] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 747.082231][ T1891] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 747.090035][ T1891] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 747.097844][ T1891] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:20 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) [ 747.105655][ T1891] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 747.113470][ T1891] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 747.121284][ T1891] 23:31:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:20 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0xc, 0x2, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x1, 0xa, 0x7, 0x8, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x6b, &(0x7f0000000080)=""/107, 0x41100, 0x4, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0xe, 0x7fff, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x1, 0x1]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[], &(0x7f00000001c0)=""/157, 0x5c, 0x9d, 0x1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000100)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0xc, 0x2, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x1, 0xa, 0x7, 0x8, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x6b, &(0x7f0000000080)=""/107, 0x41100, 0x4, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0xe, 0x7fff, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x1, 0x1]}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[], &(0x7f00000001c0)=""/157, 0x5c, 0x9d, 0x1}, 0x20) (async) 23:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:20 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x9, &(0x7f0000000140)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x42}, @map_fd={0x18, 0x6}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x567}, @generic={0x0, 0x2, 0x1, 0xffff, 0xffff8ef4}], &(0x7f0000000040)='GPL\x00', 0x4d4, 0xf8, &(0x7f00000001c0)=""/248, 0x0, 0x6, '\x00', r1, 0x25, r0, 0x8, &(0x7f0000000380)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xf, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r2, 0xffffffffffffffff, r3]}, 0x80) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000a00)=0x1) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r7 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r6}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r7}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r7, r7]}, 0x80) ioctl$TUNSETDEBUG(r7, 0x400454c9, &(0x7f0000000a40)=0x3a0a609a) r8 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r8, &(0x7f0000003380), 0x2, 0x0) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r9, &(0x7f0000003380), 0x2, 0x0) r10 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r10}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r11}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r11, r11]}, 0x80) openat$cgroup_netprio_ifpriomap(r11, &(0x7f0000000300), 0x2, 0x0) recvmsg(r5, &(0x7f0000000940)={&(0x7f0000000500)=@ax25={{0x3, @default}, [@null, @rose, @rose, @rose, @rose, @default, @rose, @rose]}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000580)=""/251, 0xfb}, {&(0x7f0000000680)=""/88, 0x58}, {&(0x7f0000000700)=""/34, 0x22}, {&(0x7f0000000740)=""/142, 0x8e}, {&(0x7f0000000800)=""/161, 0xa1}], 0x5}, 0x2043) 23:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="77ec768bf967f5b79b192e58be4a1f1a7ead4649ae45894a702036082c5a0f2cea1815f895195618b97c413298b24b130732253c7ce122725f4f7cdea883c908e211e24b53ae78ff53101b05d3aab5dbe0fdd549b8cacd1d8d4f9521dfd09a8d7300c719072e23b69ab2010000008ccb553dac75df44f4dfc69ce5395ad3320ade5f56f900a38f35a37f0e0e77405835ada13e07237cca8c265c91bf2502a4a8138171be12cfa4ca3604425b8c95f5a13556e42c9d5d94f6"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:20 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) (async) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x9, &(0x7f0000000140)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x42}, @map_fd={0x18, 0x6}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x567}, @generic={0x0, 0x2, 0x1, 0xffff, 0xffff8ef4}], &(0x7f0000000040)='GPL\x00', 0x4d4, 0xf8, &(0x7f00000001c0)=""/248, 0x0, 0x6, '\x00', r1, 0x25, r0, 0x8, &(0x7f0000000380)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xf, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r2, 0xffffffffffffffff, r3]}, 0x80) (async) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000a00)=0x1) (async) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) (async) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r7 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r6}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r7}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r7, r7]}, 0x80) (async) ioctl$TUNSETDEBUG(r7, 0x400454c9, &(0x7f0000000a40)=0x3a0a609a) (async) r8 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r8, &(0x7f0000003380), 0x2, 0x0) (async) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r9, &(0x7f0000003380), 0x2, 0x0) (async) r10 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r10}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r11}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r11, r11]}, 0x80) openat$cgroup_netprio_ifpriomap(r11, &(0x7f0000000300), 0x2, 0x0) recvmsg(r5, &(0x7f0000000940)={&(0x7f0000000500)=@ax25={{0x3, @default}, [@null, @rose, @rose, @rose, @rose, @default, @rose, @rose]}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000580)=""/251, 0xfb}, {&(0x7f0000000680)=""/88, 0x58}, {&(0x7f0000000700)=""/34, 0x22}, {&(0x7f0000000740)=""/142, 0x8e}, {&(0x7f0000000800)=""/161, 0xa1}], 0x5}, 0x2043) 23:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 747.198789][ T1939] FAULT_INJECTION: forcing a failure. [ 747.198789][ T1939] name failslab, interval 1, probability 0, space 0, times 0 [ 747.222492][ T1939] CPU: 1 PID: 1939 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 747.232487][ T1939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 747.242379][ T1939] Call Trace: [ 747.245499][ T1939] [ 747.248288][ T1939] dump_stack_lvl+0x151/0x1b7 [ 747.252790][ T1939] ? bfq_pos_tree_add_move+0x43e/0x43e [ 747.258085][ T1939] dump_stack+0x15/0x17 [ 747.262075][ T1939] should_fail+0x3c0/0x510 [ 747.266329][ T1939] __should_failslab+0x9f/0xe0 [ 747.270930][ T1939] should_failslab+0x9/0x20 [ 747.275269][ T1939] kmem_cache_alloc+0x4f/0x2f0 [ 747.279872][ T1939] ? vm_area_dup+0x26/0x1d0 [ 747.284207][ T1939] vm_area_dup+0x26/0x1d0 [ 747.288375][ T1939] dup_mmap+0x6b8/0xea0 [ 747.292372][ T1939] ? __delayed_free_task+0x20/0x20 [ 747.297315][ T1939] ? mm_init+0x807/0x960 [ 747.301393][ T1939] dup_mm+0x91/0x330 [ 747.305131][ T1939] copy_mm+0x108/0x1b0 [ 747.309034][ T1939] copy_process+0x1295/0x3250 [ 747.313544][ T1939] ? proc_fail_nth_write+0x213/0x290 [ 747.318668][ T1939] ? proc_fail_nth_read+0x220/0x220 [ 747.323700][ T1939] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 747.328648][ T1939] ? vfs_write+0x9af/0x1050 [ 747.332986][ T1939] ? vmacache_update+0xb7/0x120 [ 747.337672][ T1939] kernel_clone+0x22d/0x990 [ 747.342026][ T1939] ? file_end_write+0x1b0/0x1b0 [ 747.346713][ T1939] ? __kasan_check_write+0x14/0x20 [ 747.351646][ T1939] ? create_io_thread+0x1e0/0x1e0 [ 747.356506][ T1939] ? __mutex_lock_slowpath+0x10/0x10 [ 747.361628][ T1939] __x64_sys_clone+0x289/0x310 [ 747.366231][ T1939] ? __do_sys_vfork+0x130/0x130 [ 747.370916][ T1939] ? debug_smp_processor_id+0x17/0x20 [ 747.376383][ T1939] do_syscall_64+0x44/0xd0 [ 747.380638][ T1939] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 747.386363][ T1939] RIP: 0033:0x7f14733430a9 [ 747.390724][ T1939] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 747.410150][ T1939] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 747.418395][ T1939] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 747.426201][ T1939] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 747.434100][ T1939] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 747.441912][ T1939] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:20 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) 23:31:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="77ec768bf967f5b79b192e58be4a1f1a7ead4649ae45894a702036082c5a0f2cea1815f895195618b97c413298b24b130732253c7ce122725f4f7cdea883c908e211e24b53ae78ff53101b05d3aab5dbe0fdd549b8cacd1d8d4f9521dfd09a8d7300c719072e23b69ab2010000008ccb553dac75df44f4dfc69ce5395ad3320ade5f56f900a38f35a37f0e0e77405835ada13e07237cca8c265c91bf2502a4a8138171be12cfa4ca3604425b8c95f5a13556e42c9d5d94f6"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="77ec768bf967f5b79b192e58be4a1f1a7ead4649ae45894a702036082c5a0f2cea1815f895195618b97c413298b24b130732253c7ce122725f4f7cdea883c908e211e24b53ae78ff53101b05d3aab5dbe0fdd549b8cacd1d8d4f9521dfd09a8d7300c719072e23b69ab2010000008ccb553dac75df44f4dfc69ce5395ad3320ade5f56f900a38f35a37f0e0e77405835ada13e07237cca8c265c91bf2502a4a8138171be12cfa4ca3604425b8c95f5a13556e42c9d5d94f6"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) 23:31:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, &(0x7f0000000700), &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:20 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) (async) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x9, &(0x7f0000000140)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x42}, @map_fd={0x18, 0x6}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x567}, @generic={0x0, 0x2, 0x1, 0xffff, 0xffff8ef4}], &(0x7f0000000040)='GPL\x00', 0x4d4, 0xf8, &(0x7f00000001c0)=""/248, 0x0, 0x6, '\x00', r1, 0x25, r0, 0x8, &(0x7f0000000380)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xf, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r2, 0xffffffffffffffff, r3]}, 0x80) (async, rerun: 64) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (rerun: 64) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000a00)=0x1) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) (async) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r7 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r6}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r7}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r7, r7]}, 0x80) (async, rerun: 32) ioctl$TUNSETDEBUG(r7, 0x400454c9, &(0x7f0000000a40)=0x3a0a609a) (rerun: 32) r8 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r8, &(0x7f0000003380), 0x2, 0x0) (async) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r9, &(0x7f0000003380), 0x2, 0x0) (async) r10 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r10}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r11}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r11, r11]}, 0x80) openat$cgroup_netprio_ifpriomap(r11, &(0x7f0000000300), 0x2, 0x0) (async) recvmsg(r5, &(0x7f0000000940)={&(0x7f0000000500)=@ax25={{0x3, @default}, [@null, @rose, @rose, @rose, @rose, @default, @rose, @rose]}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000580)=""/251, 0xfb}, {&(0x7f0000000680)=""/88, 0x58}, {&(0x7f0000000700)=""/34, 0x22}, {&(0x7f0000000740)=""/142, 0x8e}, {&(0x7f0000000800)=""/161, 0xa1}], 0x5}, 0x2043) 23:31:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, &(0x7f0000000700), &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="77ec768bf967f5b79b192e58be4a1f1a7ead4649ae45894a702036082c5a0f2cea1815f895195618b97c413298b24b130732253c7ce122725f4f7cdea883c908e211e24b53ae78ff53101b05d3aab5dbe0fdd549b8cacd1d8d4f9521dfd09a8d7300c719072e23b69ab2010000008ccb553dac75df44f4dfc69ce5395ad3320ade5f56f900a38f35a37f0e0e77405835ada13e07237cca8c265c91bf2502a4a8138171be12cfa4ca3604425b8c95f5a13556e42c9d5d94f6"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="77ec768bf967f5b79b192e58be4a1f1a7ead4649ae45894a702036082c5a0f2cea1815f895195618b97c413298b24b130732253c7ce122725f4f7cdea883c908e211e24b53ae78ff53101b05d3aab5dbe0fdd549b8cacd1d8d4f9521dfd09a8d7300c719072e23b69ab2010000008ccb553dac75df44f4dfc69ce5395ad3320ade5f56f900a38f35a37f0e0e77405835ada13e07237cca8c265c91bf2502a4a8138171be12cfa4ca3604425b8c95f5a13556e42c9d5d94f6"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) [ 747.449723][ T1939] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 747.457537][ T1939] 23:31:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, &(0x7f0000000700), &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 747.506159][ T1965] FAULT_INJECTION: forcing a failure. [ 747.506159][ T1965] name failslab, interval 1, probability 0, space 0, times 0 [ 747.535113][ T1965] CPU: 1 PID: 1965 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 747.545104][ T1965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 747.555005][ T1965] Call Trace: [ 747.558122][ T1965] [ 747.560891][ T1965] dump_stack_lvl+0x151/0x1b7 [ 747.565407][ T1965] ? bfq_pos_tree_add_move+0x43e/0x43e [ 747.570699][ T1965] dump_stack+0x15/0x17 [ 747.574691][ T1965] should_fail+0x3c0/0x510 [ 747.578944][ T1965] __should_failslab+0x9f/0xe0 [ 747.583549][ T1965] should_failslab+0x9/0x20 [ 747.587885][ T1965] kmem_cache_alloc+0x4f/0x2f0 [ 747.592489][ T1965] ? vm_area_dup+0x26/0x1d0 [ 747.596825][ T1965] ? __kasan_check_read+0x11/0x20 [ 747.602211][ T1965] vm_area_dup+0x26/0x1d0 [ 747.606377][ T1965] dup_mmap+0x6b8/0xea0 [ 747.610362][ T1965] ? __delayed_free_task+0x20/0x20 [ 747.615312][ T1965] ? mm_init+0x807/0x960 [ 747.619391][ T1965] dup_mm+0x91/0x330 [ 747.623121][ T1965] copy_mm+0x108/0x1b0 [ 747.627030][ T1965] copy_process+0x1295/0x3250 [ 747.631542][ T1965] ? proc_fail_nth_write+0x213/0x290 [ 747.636662][ T1965] ? proc_fail_nth_read+0x220/0x220 [ 747.641696][ T1965] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 747.646644][ T1965] ? vfs_write+0x9af/0x1050 [ 747.650982][ T1965] ? vmacache_update+0xb7/0x120 [ 747.655686][ T1965] kernel_clone+0x22d/0x990 [ 747.660010][ T1965] ? file_end_write+0x1b0/0x1b0 [ 747.664701][ T1965] ? __kasan_check_write+0x14/0x20 [ 747.669759][ T1965] ? create_io_thread+0x1e0/0x1e0 [ 747.674624][ T1965] ? __mutex_lock_slowpath+0x10/0x10 [ 747.679737][ T1965] __x64_sys_clone+0x289/0x310 [ 747.684344][ T1965] ? __do_sys_vfork+0x130/0x130 [ 747.689026][ T1965] ? debug_smp_processor_id+0x17/0x20 [ 747.694236][ T1965] do_syscall_64+0x44/0xd0 [ 747.698483][ T1965] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 747.704212][ T1965] RIP: 0033:0x7f14733430a9 [ 747.708465][ T1965] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 747.728003][ T1965] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 747.736240][ T1965] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 747.744049][ T1965] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:21 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) 23:31:21 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs$namespace(r2, &(0x7f00000001c0)='ns/cgroup\x00') r3 = gettid() r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r3, r4, 0x0, 0x3, &(0x7f0000000240)='(]\x00'}, 0x30) r5 = perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x4, 0x80, 0x5, 0xad, 0x0, 0xfffc, 0xa38, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0xd, 0x8001, 0xffff, 0x7, 0x8, 0x7e, 0x0, 0x0, 0x6, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000200)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)=0x1) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000040)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x20000, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) 23:31:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], 0x0, 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 747.751867][ T1965] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 747.759685][ T1965] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 747.767488][ T1965] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 747.775300][ T1965] 23:31:21 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)=0x1) (async) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000040)) (async, rerun: 32) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x20000, 0x0) (async, rerun: 32) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) (async, rerun: 32) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) (rerun: 32) 23:31:21 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs$namespace(r2, &(0x7f00000001c0)='ns/cgroup\x00') r3 = gettid() r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r3, r4, 0x0, 0x3, &(0x7f0000000240)='(]\x00'}, 0x30) r5 = perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x4, 0x80, 0x5, 0xad, 0x0, 0xfffc, 0xa38, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0xd, 0x8001, 0xffff, 0x7, 0x8, 0x7e, 0x0, 0x0, 0x6, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000200)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) syz_open_procfs$namespace(r2, &(0x7f00000001c0)='ns/cgroup\x00') (async) gettid() (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r3, r4, 0x0, 0x3, &(0x7f0000000240)='(]\x00'}, 0x30) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x4, 0x80, 0x5, 0xad, 0x0, 0xfffc, 0xa38, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0xd, 0x8001, 0xffff, 0x7, 0x8, 0x7e, 0x0, 0x0, 0x6, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) (async) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000140)) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000200)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) [ 747.813958][ T1990] FAULT_INJECTION: forcing a failure. [ 747.813958][ T1990] name failslab, interval 1, probability 0, space 0, times 0 [ 747.830541][ T1990] CPU: 1 PID: 1990 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 747.840546][ T1990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 747.850442][ T1990] Call Trace: [ 747.853571][ T1990] [ 747.856339][ T1990] dump_stack_lvl+0x151/0x1b7 23:31:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)=0x1) (async) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000040)) (async, rerun: 32) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x20000, 0x0) (async, rerun: 32) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) (async, rerun: 64) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) (rerun: 64) [ 747.860855][ T1990] ? bfq_pos_tree_add_move+0x43e/0x43e [ 747.866149][ T1990] dump_stack+0x15/0x17 [ 747.870138][ T1990] should_fail+0x3c0/0x510 [ 747.874395][ T1990] __should_failslab+0x9f/0xe0 [ 747.878995][ T1990] should_failslab+0x9/0x20 [ 747.883328][ T1990] kmem_cache_alloc+0x4f/0x2f0 [ 747.887933][ T1990] ? vm_area_dup+0x26/0x1d0 [ 747.892274][ T1990] ? __kasan_check_read+0x11/0x20 [ 747.897136][ T1990] vm_area_dup+0x26/0x1d0 [ 747.901299][ T1990] dup_mmap+0x6b8/0xea0 [ 747.905292][ T1990] ? __delayed_free_task+0x20/0x20 [ 747.910238][ T1990] ? mm_init+0x807/0x960 [ 747.914320][ T1990] dup_mm+0x91/0x330 [ 747.918051][ T1990] copy_mm+0x108/0x1b0 [ 747.921958][ T1990] copy_process+0x1295/0x3250 [ 747.926479][ T1990] ? proc_fail_nth_write+0x213/0x290 [ 747.931590][ T1990] ? proc_fail_nth_read+0x220/0x220 [ 747.936708][ T1990] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 747.941660][ T1990] ? vfs_write+0x9af/0x1050 [ 747.945991][ T1990] ? compat_start_thread+0x20/0x20 [ 747.950940][ T1990] kernel_clone+0x22d/0x990 [ 747.955277][ T1990] ? file_end_write+0x1b0/0x1b0 [ 747.959963][ T1990] ? __kasan_check_write+0x14/0x20 [ 747.964913][ T1990] ? create_io_thread+0x1e0/0x1e0 [ 747.969771][ T1990] ? __mutex_lock_slowpath+0x10/0x10 [ 747.974899][ T1990] __x64_sys_clone+0x289/0x310 [ 747.979495][ T1990] ? __do_sys_vfork+0x130/0x130 [ 747.984269][ T1990] ? debug_smp_processor_id+0x17/0x20 [ 747.989484][ T1990] do_syscall_64+0x44/0xd0 [ 747.993735][ T1990] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 747.999724][ T1990] RIP: 0033:0x7f14733430a9 [ 748.003970][ T1990] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 748.023584][ T1990] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 748.031830][ T1990] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 748.039641][ T1990] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 748.047454][ T1990] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 748.055266][ T1990] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:21 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) 23:31:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)=r0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x337) r1 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1, 0xc, 0x2, 0x2, 0x0, 0x8, 0x6, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xc, 0x80000001}, 0x6001, 0x0, 0x0, 0x6, 0x8, 0x6, 0x1, 0x0, 0x1, 0x0, 0x8}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x9) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNGETVNETLE(r2, 0x800454dd, &(0x7f0000000140)) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) write$cgroup_netprio_ifpriomap(r4, &(0x7f00000001c0)={'wlan0', 0x32, 0x30}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) syz_open_procfs$namespace(r2, &(0x7f00000001c0)='ns/cgroup\x00') (async) r3 = gettid() r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r3, r4, 0x0, 0x3, &(0x7f0000000240)='(]\x00'}, 0x30) r5 = perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x4, 0x80, 0x5, 0xad, 0x0, 0xfffc, 0xa38, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0xd, 0x8001, 0xffff, 0x7, 0x8, 0x7e, 0x0, 0x0, 0x6, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000140)) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000200)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], 0x0, 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], 0x0, 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 748.063074][ T1990] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 748.070997][ T1990] 23:31:21 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)=r0) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x337) (async) r1 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1, 0xc, 0x2, 0x2, 0x0, 0x8, 0x6, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xc, 0x80000001}, 0x6001, 0x0, 0x0, 0x6, 0x8, 0x6, 0x1, 0x0, 0x1, 0x0, 0x8}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x9) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNGETVNETLE(r2, 0x800454dd, &(0x7f0000000140)) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) (async) write$cgroup_netprio_ifpriomap(r4, &(0x7f00000001c0)={'wlan0', 0x32, 0x30}, 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) [ 748.124430][ T2047] FAULT_INJECTION: forcing a failure. [ 748.124430][ T2047] name failslab, interval 1, probability 0, space 0, times 0 [ 748.158522][ T2047] CPU: 0 PID: 2047 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 748.168543][ T2047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 748.178408][ T2047] Call Trace: [ 748.181527][ T2047] [ 748.184304][ T2047] dump_stack_lvl+0x151/0x1b7 [ 748.188818][ T2047] ? bfq_pos_tree_add_move+0x43e/0x43e [ 748.194115][ T2047] dump_stack+0x15/0x17 [ 748.198102][ T2047] should_fail+0x3c0/0x510 [ 748.202361][ T2047] __should_failslab+0x9f/0xe0 [ 748.207043][ T2047] should_failslab+0x9/0x20 [ 748.211383][ T2047] kmem_cache_alloc+0x4f/0x2f0 [ 748.215992][ T2047] ? anon_vma_fork+0x1b9/0x4f0 [ 748.220669][ T2047] anon_vma_fork+0x1b9/0x4f0 [ 748.225096][ T2047] dup_mmap+0x750/0xea0 [ 748.229091][ T2047] ? __delayed_free_task+0x20/0x20 [ 748.234038][ T2047] ? mm_init+0x807/0x960 [ 748.238121][ T2047] dup_mm+0x91/0x330 [ 748.241849][ T2047] copy_mm+0x108/0x1b0 [ 748.245757][ T2047] copy_process+0x1295/0x3250 [ 748.250269][ T2047] ? proc_fail_nth_write+0x213/0x290 [ 748.255387][ T2047] ? proc_fail_nth_read+0x220/0x220 [ 748.260425][ T2047] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 748.265372][ T2047] ? vfs_write+0x9af/0x1050 [ 748.269712][ T2047] ? vmacache_update+0xb7/0x120 [ 748.274396][ T2047] kernel_clone+0x22d/0x990 [ 748.278740][ T2047] ? file_end_write+0x1b0/0x1b0 [ 748.283424][ T2047] ? __kasan_check_write+0x14/0x20 [ 748.288372][ T2047] ? create_io_thread+0x1e0/0x1e0 [ 748.293237][ T2047] ? __mutex_lock_slowpath+0x10/0x10 [ 748.298440][ T2047] __x64_sys_clone+0x289/0x310 [ 748.303040][ T2047] ? __do_sys_vfork+0x130/0x130 [ 748.307727][ T2047] ? debug_smp_processor_id+0x17/0x20 [ 748.313019][ T2047] do_syscall_64+0x44/0xd0 [ 748.317271][ T2047] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 748.322999][ T2047] RIP: 0033:0x7f14733430a9 [ 748.327254][ T2047] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 748.346694][ T2047] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 748.354939][ T2047] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 748.362754][ T2047] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:21 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) 23:31:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x0, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)=r0) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x337) r1 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1, 0xc, 0x2, 0x2, 0x0, 0x8, 0x6, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xc, 0x80000001}, 0x6001, 0x0, 0x0, 0x6, 0x8, 0x6, 0x1, 0x0, 0x1, 0x0, 0x8}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x9) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNGETVNETLE(r2, 0x800454dd, &(0x7f0000000140)) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) (async) write$cgroup_netprio_ifpriomap(r4, &(0x7f00000001c0)={'wlan0', 0x32, 0x30}, 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) 23:31:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x0, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 748.370563][ T2047] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 748.378374][ T2047] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 748.386220][ T2047] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 748.394002][ T2047] 23:31:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001240)='freezer.state\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000012c0)={0x6, 0xc, &(0x7f0000001340)=ANY=[@ANYBLOB="18000000fbffffff150000000000000018200000ab8179d89ab63c2acf15f1986730025485cf38", @ANYRES32, @ANYBLOB="0000000000000000184600000300000000000000000000004ba2e0ff0000000018330000020000000000000000000000850000008100000048090c00080000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000001200)={0x1, 0x5, 0x101, 0x4a}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001280)=[r0]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:21 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) 23:31:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x0, 0xb3, &(0x7f0000000780)=""/179, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 748.453795][ T2090] FAULT_INJECTION: forcing a failure. [ 748.453795][ T2090] name failslab, interval 1, probability 0, space 0, times 0 [ 748.478749][ T2090] CPU: 0 PID: 2090 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 748.488740][ T2090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 748.498638][ T2090] Call Trace: [ 748.501755][ T2090] [ 748.504531][ T2090] dump_stack_lvl+0x151/0x1b7 [ 748.509042][ T2090] ? bfq_pos_tree_add_move+0x43e/0x43e [ 748.514338][ T2090] ? do_syscall_64+0x44/0xd0 [ 748.518774][ T2090] dump_stack+0x15/0x17 [ 748.522756][ T2090] should_fail+0x3c0/0x510 [ 748.527016][ T2090] __should_failslab+0x9f/0xe0 [ 748.531611][ T2090] should_failslab+0x9/0x20 [ 748.535951][ T2090] kmem_cache_alloc+0x4f/0x2f0 [ 748.540549][ T2090] ? anon_vma_clone+0xa1/0x4f0 [ 748.545153][ T2090] anon_vma_clone+0xa1/0x4f0 [ 748.549576][ T2090] anon_vma_fork+0x91/0x4f0 [ 748.553917][ T2090] ? anon_vma_name+0x43/0x70 [ 748.558515][ T2090] dup_mmap+0x750/0xea0 [ 748.562510][ T2090] ? __delayed_free_task+0x20/0x20 [ 748.567456][ T2090] ? mm_init+0x807/0x960 [ 748.571535][ T2090] dup_mm+0x91/0x330 [ 748.575269][ T2090] copy_mm+0x108/0x1b0 [ 748.579193][ T2090] copy_process+0x1295/0x3250 [ 748.583687][ T2090] ? proc_fail_nth_write+0x213/0x290 [ 748.588807][ T2090] ? proc_fail_nth_read+0x220/0x220 [ 748.593848][ T2090] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 748.598789][ T2090] ? vfs_write+0x9af/0x1050 [ 748.603127][ T2090] ? vmacache_update+0xb7/0x120 [ 748.607820][ T2090] kernel_clone+0x22d/0x990 [ 748.612158][ T2090] ? file_end_write+0x1b0/0x1b0 [ 748.616930][ T2090] ? __kasan_check_write+0x14/0x20 [ 748.621876][ T2090] ? create_io_thread+0x1e0/0x1e0 [ 748.626736][ T2090] ? __mutex_lock_slowpath+0x10/0x10 [ 748.631855][ T2090] __x64_sys_clone+0x289/0x310 [ 748.636458][ T2090] ? __do_sys_vfork+0x130/0x130 [ 748.641155][ T2090] ? debug_smp_processor_id+0x17/0x20 [ 748.646448][ T2090] do_syscall_64+0x44/0xd0 [ 748.650701][ T2090] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 748.656431][ T2090] RIP: 0033:0x7f14733430a9 [ 748.660683][ T2090] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 748.680529][ T2090] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 748.688771][ T2090] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 748.696583][ T2090] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:22 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) 23:31:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:22 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0xfffffd05, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYRES16=r1, @ANYRES8=0x0, @ANYRES8=r0, @ANYRESHEX=r1], &(0x7f00000001c0)=""/152, 0xfffffffffffffc65, 0x98, 0x1}, 0x20) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0), 0x8) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)) 23:31:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001240)='freezer.state\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000012c0)={0x6, 0xc, &(0x7f0000001340)=ANY=[@ANYBLOB="18000000fbffffff150000000000000018200000ab8179d89ab63c2acf15f1986730025485cf38", @ANYRES32, @ANYBLOB="0000000000000000184600000300000000000000000000004ba2e0ff0000000018330000020000000000000000000000850000008100000048090c00080000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000001200)={0x1, 0x5, 0x101, 0x4a}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001280)=[r0]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001240)='freezer.state\x00', 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000012c0)={0x6, 0xc, &(0x7f0000001340)=ANY=[@ANYBLOB="18000000fbffffff150000000000000018200000ab8179d89ab63c2acf15f1986730025485cf38", @ANYRES32, @ANYBLOB="0000000000000000184600000300000000000000000000004ba2e0ff0000000018330000020000000000000000000000850000008100000048090c00080000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000001200)={0x1, 0x5, 0x101, 0x4a}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001280)=[r0]}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) 23:31:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:31:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 748.704393][ T2090] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 748.712206][ T2090] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 748.720017][ T2090] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 748.727919][ T2090] 23:31:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:31:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001240)='freezer.state\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000012c0)={0x6, 0xc, &(0x7f0000001340)=ANY=[@ANYBLOB="18000000fbffffff150000000000000018200000ab8179d89ab63c2acf15f1986730025485cf38", @ANYRES32, @ANYBLOB="0000000000000000184600000300000000000000000000004ba2e0ff0000000018330000020000000000000000000000850000008100000048090c00080000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000001200)={0x1, 0x5, 0x101, 0x4a}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001280)=[r0]}, 0x80) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (rerun: 32) 23:31:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 748.784979][ T2117] FAULT_INJECTION: forcing a failure. [ 748.784979][ T2117] name failslab, interval 1, probability 0, space 0, times 0 [ 748.819614][ T2117] CPU: 1 PID: 2117 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 748.829610][ T2117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 748.839508][ T2117] Call Trace: [ 748.842624][ T2117] [ 748.845493][ T2117] dump_stack_lvl+0x151/0x1b7 [ 748.850004][ T2117] ? bfq_pos_tree_add_move+0x43e/0x43e [ 748.855296][ T2117] dump_stack+0x15/0x17 [ 748.859287][ T2117] should_fail+0x3c0/0x510 [ 748.863541][ T2117] __should_failslab+0x9f/0xe0 [ 748.868139][ T2117] should_failslab+0x9/0x20 [ 748.872489][ T2117] kmem_cache_alloc+0x4f/0x2f0 [ 748.877091][ T2117] ? anon_vma_clone+0xa1/0x4f0 [ 748.881681][ T2117] anon_vma_clone+0xa1/0x4f0 [ 748.886107][ T2117] anon_vma_fork+0x91/0x4f0 [ 748.890458][ T2117] ? anon_vma_name+0x43/0x70 [ 748.894886][ T2117] dup_mmap+0x750/0xea0 [ 748.898874][ T2117] ? __delayed_free_task+0x20/0x20 [ 748.903824][ T2117] ? mm_init+0x807/0x960 [ 748.907899][ T2117] dup_mm+0x91/0x330 [ 748.911626][ T2117] copy_mm+0x108/0x1b0 [ 748.915530][ T2117] copy_process+0x1295/0x3250 [ 748.920043][ T2117] ? proc_fail_nth_write+0x213/0x290 [ 748.925163][ T2117] ? proc_fail_nth_read+0x220/0x220 [ 748.930197][ T2117] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 748.935148][ T2117] ? vfs_write+0x9af/0x1050 [ 748.939494][ T2117] ? vmacache_update+0xb7/0x120 [ 748.944178][ T2117] kernel_clone+0x22d/0x990 [ 748.948518][ T2117] ? file_end_write+0x1b0/0x1b0 [ 748.953231][ T2117] ? __kasan_check_write+0x14/0x20 [ 748.958145][ T2117] ? create_io_thread+0x1e0/0x1e0 [ 748.963006][ T2117] ? __mutex_lock_slowpath+0x10/0x10 [ 748.968135][ T2117] __x64_sys_clone+0x289/0x310 [ 748.972739][ T2117] ? __do_sys_vfork+0x130/0x130 [ 748.977424][ T2117] ? debug_smp_processor_id+0x17/0x20 [ 748.982625][ T2117] do_syscall_64+0x44/0xd0 [ 748.986878][ T2117] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 748.992603][ T2117] RIP: 0033:0x7f14733430a9 [ 748.996858][ T2117] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 749.016299][ T2117] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 749.024544][ T2117] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:22 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) 23:31:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:22 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0xfffffd05, 0x0}, 0x30) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYRES16=r1, @ANYRES8=0x0, @ANYRES8=r0, @ANYRESHEX=r1], &(0x7f00000001c0)=""/152, 0xfffffffffffffc65, 0x98, 0x1}, 0x20) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0), 0x8) (async) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)) 23:31:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064"], 0x0, 0x5c, 0x0, 0x1}, 0x20) 23:31:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000094b35efa080d730b8b91e983ca5500000100eaffffff0000060000"], &(0x7f0000001480)=""/148, 0x2a, 0x94, 0x1}, 0x20) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1, 0x9, 0x3, 0x1, 0x0, 0x9, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000040)}, 0x3800, 0xce1, 0x1, 0x9, 0x1, 0xfffffff7, 0x3, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 749.032355][ T2117] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 749.040166][ T2117] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 749.047984][ T2117] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 749.055787][ T2117] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 749.063602][ T2117] 23:31:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:31:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000094b35efa080d730b8b91e983ca5500000100eaffffff0000060000"], &(0x7f0000001480)=""/148, 0x2a, 0x94, 0x1}, 0x20) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1, 0x9, 0x3, 0x1, 0x0, 0x9, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000040)}, 0x3800, 0xce1, 0x1, 0x9, 0x1, 0xfffffff7, 0x3, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:31:22 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0xfffffd05, 0x0}, 0x30) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYRES16=r1, @ANYRES8=0x0, @ANYRES8=r0, @ANYRESHEX=r1], &(0x7f00000001c0)=""/152, 0xfffffffffffffc65, 0x98, 0x1}, 0x20) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0), 0x8) (async) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)) [ 749.129780][ T2144] FAULT_INJECTION: forcing a failure. [ 749.129780][ T2144] name failslab, interval 1, probability 0, space 0, times 0 [ 749.163442][ T2144] CPU: 1 PID: 2144 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 749.173439][ T2144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 749.183330][ T2144] Call Trace: [ 749.186454][ T2144] [ 749.189232][ T2144] dump_stack_lvl+0x151/0x1b7 [ 749.193749][ T2144] ? bfq_pos_tree_add_move+0x43e/0x43e [ 749.199037][ T2144] dump_stack+0x15/0x17 [ 749.203030][ T2144] should_fail+0x3c0/0x510 [ 749.207284][ T2144] __should_failslab+0x9f/0xe0 [ 749.211881][ T2144] should_failslab+0x9/0x20 [ 749.216222][ T2144] kmem_cache_alloc+0x4f/0x2f0 [ 749.220821][ T2144] ? anon_vma_clone+0xa1/0x4f0 [ 749.225427][ T2144] anon_vma_clone+0xa1/0x4f0 [ 749.229850][ T2144] anon_vma_fork+0x91/0x4f0 [ 749.234196][ T2144] ? anon_vma_name+0x4c/0x70 [ 749.238617][ T2144] dup_mmap+0x750/0xea0 [ 749.242609][ T2144] ? __delayed_free_task+0x20/0x20 [ 749.247556][ T2144] ? mm_init+0x807/0x960 [ 749.251636][ T2144] dup_mm+0x91/0x330 [ 749.255369][ T2144] copy_mm+0x108/0x1b0 [ 749.259271][ T2144] copy_process+0x1295/0x3250 [ 749.263788][ T2144] ? proc_fail_nth_write+0x213/0x290 [ 749.268912][ T2144] ? proc_fail_nth_read+0x220/0x220 [ 749.273968][ T2144] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 749.278887][ T2144] ? vfs_write+0x9af/0x1050 [ 749.283226][ T2144] ? vmacache_update+0xb7/0x120 [ 749.287914][ T2144] kernel_clone+0x22d/0x990 [ 749.292255][ T2144] ? file_end_write+0x1b0/0x1b0 [ 749.296939][ T2144] ? __kasan_check_write+0x14/0x20 [ 749.301887][ T2144] ? create_io_thread+0x1e0/0x1e0 [ 749.306749][ T2144] ? __mutex_lock_slowpath+0x10/0x10 [ 749.311870][ T2144] __x64_sys_clone+0x289/0x310 [ 749.316470][ T2144] ? __do_sys_vfork+0x130/0x130 [ 749.321159][ T2144] ? debug_smp_processor_id+0x17/0x20 [ 749.326364][ T2144] do_syscall_64+0x44/0xd0 [ 749.330626][ T2144] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 749.336349][ T2144] RIP: 0033:0x7f14733430a9 [ 749.340599][ T2144] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 749.360040][ T2144] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 749.368286][ T2144] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:22 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) 23:31:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000094b35efa080d730b8b91e983ca5500000100eaffffff0000060000"], &(0x7f0000001480)=""/148, 0x2a, 0x94, 0x1}, 0x20) (async) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1, 0x9, 0x3, 0x1, 0x0, 0x9, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000040)}, 0x3800, 0xce1, 0x1, 0x9, 0x1, 0xfffffff7, 0x3, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064"], &(0x7f0000000080)=""/141, 0x5c, 0x8d}, 0x20) 23:31:22 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc040000, &(0x7f0000000000)="57452ddd8314e9bd3f500c3068f85cbc87b53190afb30c917c9ae52b2326bcd3f2b986ead02268312e4e9bda862ea449af84879fd35a2f", 0x37, &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/138, 0x5c, 0x8a, 0x5}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000440)=""/57, 0x39}], 0x1}, 0x10040) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) 23:31:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x16, 0x2}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x9, 0x148, 0x3, 0x10, 0x1, 0xffff4ec9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0xb}, 0x48) 23:31:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 749.376096][ T2144] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 749.383908][ T2144] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 749.391946][ T2144] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 749.399714][ T2144] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 749.407531][ T2144] 23:31:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x16, 0x2}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x9, 0x148, 0x3, 0x10, 0x1, 0xffff4ec9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0xb}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x16, 0x2}, 0x14) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x9, 0x148, 0x3, 0x10, 0x1, 0xffff4ec9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0xb}, 0x48) (async) 23:31:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 749.495104][ T2185] FAULT_INJECTION: forcing a failure. [ 749.495104][ T2185] name failslab, interval 1, probability 0, space 0, times 0 [ 749.507736][ T2185] CPU: 0 PID: 2185 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 749.517724][ T2185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 749.527717][ T2185] Call Trace: [ 749.530819][ T2185] [ 749.533680][ T2185] dump_stack_lvl+0x151/0x1b7 [ 749.538195][ T2185] ? bfq_pos_tree_add_move+0x43e/0x43e [ 749.543501][ T2185] dump_stack+0x15/0x17 [ 749.547480][ T2185] should_fail+0x3c0/0x510 [ 749.551761][ T2185] __should_failslab+0x9f/0xe0 [ 749.556332][ T2185] should_failslab+0x9/0x20 [ 749.560683][ T2185] kmem_cache_alloc+0x4f/0x2f0 [ 749.565272][ T2185] ? anon_vma_fork+0x1b9/0x4f0 [ 749.569874][ T2185] anon_vma_fork+0x1b9/0x4f0 [ 749.574298][ T2185] dup_mmap+0x750/0xea0 [ 749.578295][ T2185] ? __delayed_free_task+0x20/0x20 [ 749.583241][ T2185] ? mm_init+0x807/0x960 [ 749.587318][ T2185] dup_mm+0x91/0x330 [ 749.591049][ T2185] copy_mm+0x108/0x1b0 [ 749.594956][ T2185] copy_process+0x1295/0x3250 [ 749.599567][ T2185] ? proc_fail_nth_write+0x213/0x290 [ 749.604680][ T2185] ? proc_fail_nth_read+0x220/0x220 [ 749.609741][ T2185] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 749.614659][ T2185] ? vfs_write+0x9af/0x1050 [ 749.619085][ T2185] ? vmacache_update+0xb7/0x120 [ 749.623772][ T2185] kernel_clone+0x22d/0x990 [ 749.628110][ T2185] ? file_end_write+0x1b0/0x1b0 [ 749.632798][ T2185] ? __kasan_check_write+0x14/0x20 [ 749.637755][ T2185] ? create_io_thread+0x1e0/0x1e0 [ 749.642607][ T2185] ? __mutex_lock_slowpath+0x10/0x10 [ 749.647725][ T2185] __x64_sys_clone+0x289/0x310 [ 749.652334][ T2185] ? __do_sys_vfork+0x130/0x130 [ 749.657018][ T2185] ? debug_smp_processor_id+0x17/0x20 [ 749.662232][ T2185] do_syscall_64+0x44/0xd0 [ 749.666477][ T2185] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 749.672204][ T2185] RIP: 0033:0x7f14733430a9 [ 749.676457][ T2185] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:31:23 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) 23:31:23 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc040000, &(0x7f0000000000)="57452ddd8314e9bd3f500c3068f85cbc87b53190afb30c917c9ae52b2326bcd3f2b986ead02268312e4e9bda862ea449af84879fd35a2f", 0x37, &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/138, 0x5c, 0x8a, 0x5}, 0x20) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000440)=""/57, 0x39}], 0x1}, 0x10040) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) (rerun: 32) 23:31:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:31:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x16, 0x2}, 0x14) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x9, 0x148, 0x3, 0x10, 0x1, 0xffff4ec9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0xb}, 0x48) 23:31:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 749.695896][ T2185] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 749.704142][ T2185] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 749.711953][ T2185] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 749.719776][ T2185] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 749.727577][ T2185] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 749.735386][ T2185] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 749.743201][ T2185] [ 749.767003][ T2199] FAULT_INJECTION: forcing a failure. [ 749.767003][ T2199] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 749.785630][ T2199] CPU: 0 PID: 2199 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 749.795620][ T2199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 749.805989][ T2199] Call Trace: [ 749.809110][ T2199] [ 749.811886][ T2199] dump_stack_lvl+0x151/0x1b7 23:31:23 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc040000, &(0x7f0000000000)="57452ddd8314e9bd3f500c3068f85cbc87b53190afb30c917c9ae52b2326bcd3f2b986ead02268312e4e9bda862ea449af84879fd35a2f", 0x37, &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/138, 0x5c, 0x8a, 0x5}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000440)=""/57, 0x39}], 0x1}, 0x10040) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) 23:31:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:23 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc040000, &(0x7f0000000000)="57452ddd8314e9bd3f500c3068f85cbc87b53190afb30c917c9ae52b2326bcd3f2b986ead02268312e4e9bda862ea449af84879fd35a2f", 0x37, &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/138, 0x5c, 0x8a, 0x5}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000440)=""/57, 0x39}], 0x1}, 0x10040) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0xc040000, &(0x7f0000000000)="57452ddd8314e9bd3f500c3068f85cbc87b53190afb30c917c9ae52b2326bcd3f2b986ead02268312e4e9bda862ea449af84879fd35a2f", 0x37, &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/138, 0x5c, 0x8a, 0x5}, 0x20) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000440)=""/57, 0x39}], 0x1}, 0x10040) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) (async) 23:31:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 23:31:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 23:31:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 749.816661][ T2199] ? bfq_pos_tree_add_move+0x43e/0x43e [ 749.821957][ T2199] dump_stack+0x15/0x17 [ 749.825947][ T2199] should_fail+0x3c0/0x510 [ 749.830203][ T2199] should_fail_alloc_page+0x58/0x70 [ 749.835322][ T2199] __alloc_pages+0x1de/0x7c0 [ 749.839747][ T2199] ? __count_vm_events+0x30/0x30 [ 749.844529][ T2199] pte_alloc_one+0x73/0x1b0 [ 749.848862][ T2199] ? pfn_modify_allowed+0x2e0/0x2e0 [ 749.853897][ T2199] __pte_alloc+0x86/0x350 [ 749.858055][ T2199] ? free_pgtables+0x210/0x210 [ 749.862659][ T2199] ? _raw_spin_lock+0xa3/0x1b0 [ 749.867268][ T2199] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 749.872471][ T2199] ? unwind_get_return_address+0x4c/0x90 [ 749.877938][ T2199] copy_pte_range+0x1b1f/0x20b0 [ 749.882631][ T2199] ? stack_trace_save+0x12d/0x1f0 [ 749.887481][ T2199] ? anon_vma_clone+0xa1/0x4f0 [ 749.892087][ T2199] ? __kunmap_atomic+0x80/0x80 [ 749.896684][ T2199] ? dup_mmap+0x750/0xea0 [ 749.901261][ T2199] ? copy_mm+0x108/0x1b0 [ 749.905341][ T2199] ? copy_process+0x1295/0x3250 [ 749.910026][ T2199] ? kernel_clone+0x22d/0x990 [ 749.914541][ T2199] ? __x64_sys_clone+0x289/0x310 [ 749.919315][ T2199] ? do_syscall_64+0x44/0xd0 [ 749.923740][ T2199] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 749.929644][ T2199] copy_page_range+0xc1e/0x1090 [ 749.934334][ T2199] ? pfn_valid+0x1e0/0x1e0 [ 749.938585][ T2199] dup_mmap+0x99f/0xea0 [ 749.942586][ T2199] ? __delayed_free_task+0x20/0x20 [ 749.947519][ T2199] ? mm_init+0x807/0x960 [ 749.951596][ T2199] dup_mm+0x91/0x330 [ 749.955327][ T2199] copy_mm+0x108/0x1b0 [ 749.959235][ T2199] copy_process+0x1295/0x3250 [ 749.963761][ T2199] ? proc_fail_nth_write+0x213/0x290 [ 749.968869][ T2199] ? proc_fail_nth_read+0x220/0x220 [ 749.973990][ T2199] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 749.978935][ T2199] ? vfs_write+0x9af/0x1050 [ 749.983274][ T2199] ? vmacache_update+0xb7/0x120 [ 749.987961][ T2199] kernel_clone+0x22d/0x990 [ 749.992301][ T2199] ? file_end_write+0x1b0/0x1b0 [ 749.996988][ T2199] ? __kasan_check_write+0x14/0x20 [ 750.001935][ T2199] ? create_io_thread+0x1e0/0x1e0 [ 750.006796][ T2199] ? __mutex_lock_slowpath+0x10/0x10 [ 750.011918][ T2199] __x64_sys_clone+0x289/0x310 [ 750.016517][ T2199] ? __do_sys_vfork+0x130/0x130 [ 750.021204][ T2199] ? debug_smp_processor_id+0x17/0x20 [ 750.026411][ T2199] do_syscall_64+0x44/0xd0 [ 750.030669][ T2199] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 750.036392][ T2199] RIP: 0033:0x7f14733430a9 [ 750.040673][ T2199] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 750.060087][ T2199] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:23 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) 23:31:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 23:31:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/125, 0x5c, 0x7d, 0x20001}, 0x20) 23:31:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:23 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc040000, &(0x7f0000000000)="57452ddd8314e9bd3f500c3068f85cbc87b53190afb30c917c9ae52b2326bcd3f2b986ead02268312e4e9bda862ea449af84879fd35a2f", 0x37, &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/138, 0x5c, 0x8a, 0x5}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000440)=""/57, 0x39}], 0x1}, 0x10040) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) 23:31:23 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000480)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0xfff, 0x0}, 0x8) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) openat$cgroup_int(r4, &(0x7f0000000900)='cpuset.cpu_exclusive\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x1, &(0x7f0000000380)=@raw=[@jmp={0x5, 0x0, 0x1, 0x8, 0x4, 0xfffffffffffffff4}], &(0x7f00000003c0)='GPL\x00', 0x77ab, 0x42, &(0x7f0000000400)=""/66, 0x41000, 0x1, '\x00', r1, 0x27, r0, 0x8, &(0x7f0000000780)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x9, 0x785, 0x3}, 0x10, r2, r3, 0x0, &(0x7f0000000840)=[r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x2}}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x55, 0x5}]}, {0x0, [0x0, 0x2e, 0x2e]}}, &(0x7f0000000040)=""/5, 0x45, 0x5}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000240)="261cef09d8fb1dae1e3c3f3b933b1ac24f315b71965af82e2e692b9ea6cfe152ba80150832a112c94742fb6976bf5b2e081468a613e25b4adcf2bda8a9887d88632238daf465c1483be452f3135835bea9c5c08ab2100ef7c3c2817440eb163f66d6af409f25f5b179f24e2b7e1e589d34231e22e54c7adcdc9797b3cd5d88b6ec078c88760351226bbe52bd724d757590f750f5e971336661e664d881455d419e", &(0x7f0000000300)=""/6}, 0x20) [ 750.068331][ T2199] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 750.076167][ T2199] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 750.083963][ T2199] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 750.091769][ T2199] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 750.099579][ T2199] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 750.107394][ T2199] 23:31:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/125, 0x5c, 0x7d, 0x20001}, 0x20) [ 750.125313][ T2231] FAULT_INJECTION: forcing a failure. [ 750.125313][ T2231] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 750.148408][ T2231] CPU: 0 PID: 2231 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 750.158395][ T2231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 750.168290][ T2231] Call Trace: [ 750.171413][ T2231] 23:31:23 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc040000, &(0x7f0000000000)="57452ddd8314e9bd3f500c3068f85cbc87b53190afb30c917c9ae52b2326bcd3f2b986ead02268312e4e9bda862ea449af84879fd35a2f", 0x37, &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/138, 0x5c, 0x8a, 0x5}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000440)=""/57, 0x39}], 0x1}, 0x10040) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) 23:31:23 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc040000, &(0x7f0000000000)="57452ddd8314e9bd3f500c3068f85cbc87b53190afb30c917c9ae52b2326bcd3f2b986ead02268312e4e9bda862ea449af84879fd35a2f", 0x37, &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], &(0x7f0000000080)=""/138, 0x5c, 0x8a, 0x5}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) [ 750.174188][ T2231] dump_stack_lvl+0x151/0x1b7 [ 750.178706][ T2231] ? bfq_pos_tree_add_move+0x43e/0x43e [ 750.184003][ T2231] dump_stack+0x15/0x17 [ 750.188005][ T2231] should_fail+0x3c0/0x510 [ 750.192247][ T2231] should_fail_alloc_page+0x58/0x70 [ 750.197280][ T2231] __alloc_pages+0x1de/0x7c0 [ 750.201710][ T2231] ? __count_vm_events+0x30/0x30 [ 750.206481][ T2231] ? __this_cpu_preempt_check+0x13/0x20 [ 750.211863][ T2231] ? __mod_node_page_state+0xac/0xf0 [ 750.216982][ T2231] ? __mod_lruvec_page_state+0x15f/0x1c0 23:31:23 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc040000, &(0x7f0000000000)="57452ddd8314e9bd3f500c3068f85cbc87b53190afb30c917c9ae52b2326bcd3f2b986ead02268312e4e9bda862ea449af84879fd35a2f", 0x37, &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) [ 750.222449][ T2231] pte_alloc_one+0x73/0x1b0 [ 750.226876][ T2231] ? pfn_modify_allowed+0x2e0/0x2e0 [ 750.231917][ T2231] __pte_alloc+0x86/0x350 [ 750.236075][ T2231] ? free_pgtables+0x210/0x210 [ 750.240676][ T2231] ? _raw_spin_lock+0xa3/0x1b0 [ 750.245277][ T2231] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 750.250482][ T2231] ? unwind_get_return_address+0x4c/0x90 [ 750.255956][ T2231] copy_pte_range+0x1b1f/0x20b0 [ 750.260641][ T2231] ? stack_trace_save+0x12d/0x1f0 [ 750.265501][ T2231] ? anon_vma_clone+0xa1/0x4f0 [ 750.270101][ T2231] ? __kunmap_atomic+0x80/0x80 [ 750.274696][ T2231] ? dup_mmap+0x750/0xea0 [ 750.278865][ T2231] ? copy_mm+0x108/0x1b0 [ 750.282945][ T2231] ? copy_process+0x1295/0x3250 [ 750.287630][ T2231] ? kernel_clone+0x22d/0x990 [ 750.292143][ T2231] ? __x64_sys_clone+0x289/0x310 [ 750.296916][ T2231] ? do_syscall_64+0x44/0xd0 [ 750.301341][ T2231] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 750.307249][ T2231] copy_page_range+0xc1e/0x1090 [ 750.311932][ T2231] ? pfn_valid+0x1e0/0x1e0 [ 750.316181][ T2231] dup_mmap+0x99f/0xea0 [ 750.320173][ T2231] ? __delayed_free_task+0x20/0x20 [ 750.325120][ T2231] ? mm_init+0x807/0x960 [ 750.329198][ T2231] dup_mm+0x91/0x330 [ 750.332932][ T2231] copy_mm+0x108/0x1b0 [ 750.336837][ T2231] copy_process+0x1295/0x3250 [ 750.341350][ T2231] ? proc_fail_nth_write+0x213/0x290 [ 750.346470][ T2231] ? proc_fail_nth_read+0x220/0x220 [ 750.351509][ T2231] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 750.356452][ T2231] ? vfs_write+0x9af/0x1050 [ 750.360791][ T2231] ? vmacache_update+0xb7/0x120 [ 750.365480][ T2231] kernel_clone+0x22d/0x990 [ 750.369821][ T2231] ? file_end_write+0x1b0/0x1b0 [ 750.374507][ T2231] ? __kasan_check_write+0x14/0x20 [ 750.379452][ T2231] ? create_io_thread+0x1e0/0x1e0 [ 750.384314][ T2231] ? __mutex_lock_slowpath+0x10/0x10 [ 750.389445][ T2231] __x64_sys_clone+0x289/0x310 [ 750.394057][ T2231] ? __do_sys_vfork+0x130/0x130 [ 750.398723][ T2231] ? debug_smp_processor_id+0x17/0x20 [ 750.403937][ T2231] do_syscall_64+0x44/0xd0 [ 750.408184][ T2231] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 750.413910][ T2231] RIP: 0033:0x7f14733430a9 [ 750.418164][ T2231] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 750.437955][ T2231] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 750.446196][ T2231] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 750.454007][ T2231] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 750.461818][ T2231] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:23 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 75) 23:31:23 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc040000, &(0x7f0000000000)="57452ddd8314e9bd3f500c3068f85cbc87b53190afb30c917c9ae52b2326bcd3f2b986ead02268312e4e9bda862ea449af84879fd35a2f", 0x37, &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) 23:31:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/125, 0x5c, 0x7d, 0x20001}, 0x20) 23:31:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:23 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000480)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0xfff, 0x0}, 0x8) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) openat$cgroup_int(r4, &(0x7f0000000900)='cpuset.cpu_exclusive\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x1, &(0x7f0000000380)=@raw=[@jmp={0x5, 0x0, 0x1, 0x8, 0x4, 0xfffffffffffffff4}], &(0x7f00000003c0)='GPL\x00', 0x77ab, 0x42, &(0x7f0000000400)=""/66, 0x41000, 0x1, '\x00', r1, 0x27, r0, 0x8, &(0x7f0000000780)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x9, 0x785, 0x3}, 0x10, r2, r3, 0x0, &(0x7f0000000840)=[r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x2}}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x55, 0x5}]}, {0x0, [0x0, 0x2e, 0x2e]}}, &(0x7f0000000040)=""/5, 0x45, 0x5}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000240)="261cef09d8fb1dae1e3c3f3b933b1ac24f315b71965af82e2e692b9ea6cfe152ba80150832a112c94742fb6976bf5b2e081468a613e25b4adcf2bda8a9887d88632238daf465c1483be452f3135835bea9c5c08ab2100ef7c3c2817440eb163f66d6af409f25f5b179f24e2b7e1e589d34231e22e54c7adcdc9797b3cd5d88b6ec078c88760351226bbe52bd724d757590f750f5e971336661e664d881455d419e", &(0x7f0000000300)=""/6}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000480)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0xfff}, 0x8) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) openat$cgroup_int(r4, &(0x7f0000000900)='cpuset.cpu_exclusive\x00', 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x1, &(0x7f0000000380)=@raw=[@jmp={0x5, 0x0, 0x1, 0x8, 0x4, 0xfffffffffffffff4}], &(0x7f00000003c0)='GPL\x00', 0x77ab, 0x42, &(0x7f0000000400)=""/66, 0x41000, 0x1, '\x00', r1, 0x27, r0, 0x8, &(0x7f0000000780)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x9, 0x785, 0x3}, 0x10, r2, r3, 0x0, &(0x7f0000000840)=[r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x2}}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x55, 0x5}]}, {0x0, [0x0, 0x2e, 0x2e]}}, &(0x7f0000000040)=""/5, 0x45, 0x5}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000240)="261cef09d8fb1dae1e3c3f3b933b1ac24f315b71965af82e2e692b9ea6cfe152ba80150832a112c94742fb6976bf5b2e081468a613e25b4adcf2bda8a9887d88632238daf465c1483be452f3135835bea9c5c08ab2100ef7c3c2817440eb163f66d6af409f25f5b179f24e2b7e1e589d34231e22e54c7adcdc9797b3cd5d88b6ec078c88760351226bbe52bd724d757590f750f5e971336661e664d881455d419e", &(0x7f0000000300)=""/6}, 0x20) (async) 23:31:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 750.469630][ T2231] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 750.477447][ T2231] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 750.485256][ T2231] [ 750.503004][ T2260] FAULT_INJECTION: forcing a failure. [ 750.503004][ T2260] name failslab, interval 1, probability 0, space 0, times 0 23:31:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) openat$cgroup_pressure(r1, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000200)=r0, 0x4) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x80000008}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) openat$cgroup_devices(r3, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) 23:31:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:24 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) 23:31:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}, @typedef={0x0, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) [ 750.533610][ T2260] CPU: 0 PID: 2260 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 750.543596][ T2260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 750.553491][ T2260] Call Trace: [ 750.556614][ T2260] [ 750.559395][ T2260] dump_stack_lvl+0x151/0x1b7 [ 750.563909][ T2260] ? bfq_pos_tree_add_move+0x43e/0x43e [ 750.569201][ T2260] ? do_syscall_64+0x44/0xd0 [ 750.573633][ T2260] dump_stack+0x15/0x17 [ 750.577620][ T2260] should_fail+0x3c0/0x510 [ 750.581872][ T2260] __should_failslab+0x9f/0xe0 [ 750.586472][ T2260] should_failslab+0x9/0x20 [ 750.590809][ T2260] kmem_cache_alloc+0x4f/0x2f0 [ 750.595414][ T2260] ? anon_vma_clone+0xa1/0x4f0 [ 750.600014][ T2260] anon_vma_clone+0xa1/0x4f0 [ 750.604445][ T2260] anon_vma_fork+0x91/0x4f0 [ 750.608781][ T2260] ? anon_vma_name+0x43/0x70 [ 750.613204][ T2260] dup_mmap+0x750/0xea0 [ 750.617194][ T2260] ? __delayed_free_task+0x20/0x20 [ 750.622143][ T2260] ? mm_init+0x807/0x960 [ 750.626220][ T2260] dup_mm+0x91/0x330 [ 750.629951][ T2260] copy_mm+0x108/0x1b0 [ 750.633854][ T2260] copy_process+0x1295/0x3250 [ 750.638371][ T2260] ? proc_fail_nth_write+0x213/0x290 [ 750.643490][ T2260] ? proc_fail_nth_read+0x220/0x220 [ 750.648525][ T2260] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 750.653471][ T2260] ? vfs_write+0x9af/0x1050 [ 750.657810][ T2260] ? vmacache_update+0xb7/0x120 [ 750.662497][ T2260] kernel_clone+0x22d/0x990 [ 750.666836][ T2260] ? file_end_write+0x1b0/0x1b0 [ 750.671524][ T2260] ? __kasan_check_write+0x14/0x20 [ 750.676477][ T2260] ? create_io_thread+0x1e0/0x1e0 [ 750.681334][ T2260] ? __mutex_lock_slowpath+0x10/0x10 [ 750.686454][ T2260] __x64_sys_clone+0x289/0x310 [ 750.691054][ T2260] ? __do_sys_vfork+0x130/0x130 [ 750.695741][ T2260] ? debug_smp_processor_id+0x17/0x20 [ 750.700947][ T2260] do_syscall_64+0x44/0xd0 [ 750.705199][ T2260] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 750.710927][ T2260] RIP: 0033:0x7f14733430a9 [ 750.715183][ T2260] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:31:24 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 76) 23:31:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) openat$cgroup_pressure(r1, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000200)=r0, 0x4) (async) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) (async) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) (async) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r4}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x80000008}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) (async) openat$cgroup_devices(r3, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) 23:31:24 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000480)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0xfff, 0x0}, 0x8) (async) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) (async) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) openat$cgroup_int(r4, &(0x7f0000000900)='cpuset.cpu_exclusive\x00', 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x1, &(0x7f0000000380)=@raw=[@jmp={0x5, 0x0, 0x1, 0x8, 0x4, 0xfffffffffffffff4}], &(0x7f00000003c0)='GPL\x00', 0x77ab, 0x42, &(0x7f0000000400)=""/66, 0x41000, 0x1, '\x00', r1, 0x27, r0, 0x8, &(0x7f0000000780)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x9, 0x785, 0x3}, 0x10, r2, r3, 0x0, &(0x7f0000000840)=[r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x2}}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x55, 0x5}]}, {0x0, [0x0, 0x2e, 0x2e]}}, &(0x7f0000000040)=""/5, 0x45, 0x5}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000240)="261cef09d8fb1dae1e3c3f3b933b1ac24f315b71965af82e2e692b9ea6cfe152ba80150832a112c94742fb6976bf5b2e081468a613e25b4adcf2bda8a9887d88632238daf465c1483be452f3135835bea9c5c08ab2100ef7c3c2817440eb163f66d6af409f25f5b179f24e2b7e1e589d34231e22e54c7adcdc9797b3cd5d88b6ec078c88760351226bbe52bd724d757590f750f5e971336661e664d881455d419e", &(0x7f0000000300)=""/6}, 0x20) 23:31:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 750.734627][ T2260] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 750.742866][ T2260] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 750.750679][ T2260] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 750.758490][ T2260] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 750.766304][ T2260] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 750.774112][ T2260] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 750.781927][ T2260] 23:31:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) openat$cgroup_pressure(r1, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000200)=r0, 0x4) (async) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) (async) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r4}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x80000008}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) openat$cgroup_devices(r3, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) 23:31:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:24 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018", @ANYRESOCT=r0], &(0x7f00000001c0)=""/130, 0x5c, 0x82, 0x1}, 0x20) 23:31:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 750.836686][ T2315] FAULT_INJECTION: forcing a failure. [ 750.836686][ T2315] name failslab, interval 1, probability 0, space 0, times 0 [ 750.870427][ T2315] CPU: 0 PID: 2315 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 750.880427][ T2315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 750.890321][ T2315] Call Trace: [ 750.893438][ T2315] [ 750.896215][ T2315] dump_stack_lvl+0x151/0x1b7 [ 750.900727][ T2315] ? bfq_pos_tree_add_move+0x43e/0x43e [ 750.906023][ T2315] dump_stack+0x15/0x17 [ 750.910014][ T2315] should_fail+0x3c0/0x510 [ 750.914270][ T2315] __should_failslab+0x9f/0xe0 [ 750.918870][ T2315] should_failslab+0x9/0x20 [ 750.923217][ T2315] kmem_cache_alloc+0x4f/0x2f0 [ 750.927829][ T2315] ? vm_area_dup+0x26/0x1d0 [ 750.932151][ T2315] ? __kasan_check_read+0x11/0x20 [ 750.937009][ T2315] vm_area_dup+0x26/0x1d0 [ 750.941173][ T2315] dup_mmap+0x6b8/0xea0 [ 750.945167][ T2315] ? __delayed_free_task+0x20/0x20 [ 750.950115][ T2315] ? mm_init+0x807/0x960 [ 750.954222][ T2315] dup_mm+0x91/0x330 [ 750.957926][ T2315] copy_mm+0x108/0x1b0 [ 750.961919][ T2315] copy_process+0x1295/0x3250 [ 750.966436][ T2315] ? proc_fail_nth_write+0x213/0x290 [ 750.971551][ T2315] ? proc_fail_nth_read+0x220/0x220 [ 750.976592][ T2315] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 750.981532][ T2315] ? vfs_write+0x9af/0x1050 [ 750.985875][ T2315] ? vmacache_update+0xb7/0x120 [ 750.990560][ T2315] kernel_clone+0x22d/0x990 [ 750.994898][ T2315] ? file_end_write+0x1b0/0x1b0 [ 750.999622][ T2315] ? __kasan_check_write+0x14/0x20 [ 751.004532][ T2315] ? create_io_thread+0x1e0/0x1e0 [ 751.009394][ T2315] ? __mutex_lock_slowpath+0x10/0x10 [ 751.014515][ T2315] __x64_sys_clone+0x289/0x310 [ 751.019116][ T2315] ? __do_sys_vfork+0x130/0x130 [ 751.023803][ T2315] ? debug_smp_processor_id+0x17/0x20 [ 751.029008][ T2315] do_syscall_64+0x44/0xd0 [ 751.033264][ T2315] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 751.038989][ T2315] RIP: 0033:0x7f14733430a9 [ 751.043244][ T2315] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 751.062683][ T2315] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 751.070931][ T2315] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 751.078827][ T2315] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:24 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 77) 23:31:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, &(0x7f0000000700), &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xaf, 0xaf, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}, @var={0xc, 0x0, 0x0, 0xe, 0x2}, @fwd={0xa}, @func={0x10, 0x0, 0x0, 0xc, 0x1}, @datasec={0xc, 0x2, 0x0, 0xf, 0x3, [{0x1, 0x511a, 0xfffffffd}, {0x1, 0x5, 0x3}], "8769a1"}, @union={0x6, 0x4, 0x0, 0x5, 0x1, 0x7f, [{0x7, 0x1, 0x3}, {0x10, 0x2, 0x2}, {0xa, 0x2, 0x1}, {0x7, 0x1, 0x5}]}, @func={0x1, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x30, 0x30, 0x30, 0x2e, 0x61]}}, &(0x7f0000000000)=""/72, 0xcf, 0x48}, 0x20) 23:31:24 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018", @ANYRESOCT=r0], &(0x7f00000001c0)=""/130, 0x5c, 0x82, 0x1}, 0x20) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018", @ANYRESOCT=r0], &(0x7f00000001c0)=""/130, 0x5c, 0x82, 0x1}, 0x20) (async) 23:31:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 751.086640][ T2315] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 751.094451][ T2315] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 751.102268][ T2315] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 751.110076][ T2315] 23:31:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, &(0x7f0000000700), &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xaf, 0xaf, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}, @var={0xc, 0x0, 0x0, 0xe, 0x2}, @fwd={0xa}, @func={0x10, 0x0, 0x0, 0xc, 0x1}, @datasec={0xc, 0x2, 0x0, 0xf, 0x3, [{0x1, 0x511a, 0xfffffffd}, {0x1, 0x5, 0x3}], "8769a1"}, @union={0x6, 0x4, 0x0, 0x5, 0x1, 0x7f, [{0x7, 0x1, 0x3}, {0x10, 0x2, 0x2}, {0xa, 0x2, 0x1}, {0x7, 0x1, 0x5}]}, @func={0x1, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x30, 0x30, 0x30, 0x2e, 0x61]}}, &(0x7f0000000000)=""/72, 0xcf, 0x48}, 0x20) 23:31:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 751.142975][ T2338] FAULT_INJECTION: forcing a failure. [ 751.142975][ T2338] name failslab, interval 1, probability 0, space 0, times 0 [ 751.165055][ T2338] CPU: 0 PID: 2338 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 751.175047][ T2338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 751.184950][ T2338] Call Trace: [ 751.188064][ T2338] 23:31:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, &(0x7f0000000700), &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xaf, 0xaf, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}, @var={0xc, 0x0, 0x0, 0xe, 0x2}, @fwd={0xa}, @func={0x10, 0x0, 0x0, 0xc, 0x1}, @datasec={0xc, 0x2, 0x0, 0xf, 0x3, [{0x1, 0x511a, 0xfffffffd}, {0x1, 0x5, 0x3}], "8769a1"}, @union={0x6, 0x4, 0x0, 0x5, 0x1, 0x7f, [{0x7, 0x1, 0x3}, {0x10, 0x2, 0x2}, {0xa, 0x2, 0x1}, {0x7, 0x1, 0x5}]}, @func={0x1, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x30, 0x30, 0x30, 0x2e, 0x61]}}, &(0x7f0000000000)=""/72, 0xcf, 0x48}, 0x20) [ 751.190843][ T2338] dump_stack_lvl+0x151/0x1b7 [ 751.195356][ T2338] ? bfq_pos_tree_add_move+0x43e/0x43e [ 751.201184][ T2338] dump_stack+0x15/0x17 [ 751.205177][ T2338] should_fail+0x3c0/0x510 [ 751.209432][ T2338] __should_failslab+0x9f/0xe0 [ 751.214030][ T2338] should_failslab+0x9/0x20 [ 751.218366][ T2338] kmem_cache_alloc+0x4f/0x2f0 [ 751.222971][ T2338] ? anon_vma_clone+0xa1/0x4f0 [ 751.227575][ T2338] anon_vma_clone+0xa1/0x4f0 [ 751.231996][ T2338] anon_vma_fork+0x91/0x4f0 [ 751.236335][ T2338] ? anon_vma_name+0x43/0x70 [ 751.240766][ T2338] dup_mmap+0x750/0xea0 [ 751.244756][ T2338] ? __delayed_free_task+0x20/0x20 [ 751.249701][ T2338] ? mm_init+0x807/0x960 [ 751.253778][ T2338] dup_mm+0x91/0x330 [ 751.257510][ T2338] copy_mm+0x108/0x1b0 [ 751.261504][ T2338] copy_process+0x1295/0x3250 [ 751.266017][ T2338] ? proc_fail_nth_write+0x213/0x290 [ 751.271132][ T2338] ? proc_fail_nth_read+0x220/0x220 [ 751.276167][ T2338] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 751.281113][ T2338] ? vfs_write+0x9af/0x1050 [ 751.285453][ T2338] ? vmacache_update+0xb7/0x120 [ 751.290141][ T2338] kernel_clone+0x22d/0x990 [ 751.294480][ T2338] ? file_end_write+0x1b0/0x1b0 [ 751.299168][ T2338] ? __kasan_check_write+0x14/0x20 [ 751.304205][ T2338] ? create_io_thread+0x1e0/0x1e0 [ 751.309063][ T2338] ? __mutex_lock_slowpath+0x10/0x10 [ 751.314182][ T2338] __x64_sys_clone+0x289/0x310 [ 751.318781][ T2338] ? __do_sys_vfork+0x130/0x130 [ 751.323469][ T2338] ? debug_smp_processor_id+0x17/0x20 [ 751.328681][ T2338] do_syscall_64+0x44/0xd0 [ 751.332929][ T2338] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 751.338667][ T2338] RIP: 0033:0x7f14733430a9 [ 751.342912][ T2338] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 751.362355][ T2338] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 751.370598][ T2338] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 751.378412][ T2338] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 751.386219][ T2338] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:24 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 78) 23:31:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:24 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0x0, 0xfee, 0x10}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x1, &(0x7f0000000540)=@raw=[@ldst={0x3, 0x2, 0x2, 0x2, 0xa, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x3, 0xe3, &(0x7f00000005c0)=""/227, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000006c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x7, 0x6, 0x40, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[0x1, r1]}, 0x80) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/142, 0x5c, 0x8e, 0xfffffffe}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={r2, 0x20, &(0x7f0000000440)={&(0x7f00000002c0)=""/178, 0xb2, 0x0, &(0x7f0000000380)=""/159, 0x9f}}, 0x10) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x8, &(0x7f0000000100)=@raw=[@ldst={0x3, 0x3, 0x2, 0x9, 0xa, 0xfffffffffffffffc, 0x1}, @exit, @ldst={0x1, 0x1, 0x3, 0x2, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfff}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x200}, @exit], &(0x7f0000000200)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x4, '\x00', r3, 0x18, r4, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x7, 0x7fffffff, 0x5}, 0x10, r5, r6}, 0x80) 23:31:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], 0x0, 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:24 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async, rerun: 64) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018", @ANYRESOCT=r0], &(0x7f00000001c0)=""/130, 0x5c, 0x82, 0x1}, 0x20) 23:31:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}, @fwd={0xc}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0xa2, 0xe8, 0x1}, 0x20) 23:31:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], 0x0, 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 751.394031][ T2338] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 751.401841][ T2338] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 751.409663][ T2338] 23:31:24 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0x0, 0xfee, 0x10}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x1, &(0x7f0000000540)=@raw=[@ldst={0x3, 0x2, 0x2, 0x2, 0xa, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x3, 0xe3, &(0x7f00000005c0)=""/227, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000006c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x7, 0x6, 0x40, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[0x1, r1]}, 0x80) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/142, 0x5c, 0x8e, 0xfffffffe}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={r2, 0x20, &(0x7f0000000440)={&(0x7f00000002c0)=""/178, 0xb2, 0x0, &(0x7f0000000380)=""/159, 0x9f}}, 0x10) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x8, &(0x7f0000000100)=@raw=[@ldst={0x3, 0x3, 0x2, 0x9, 0xa, 0xfffffffffffffffc, 0x1}, @exit, @ldst={0x1, 0x1, 0x3, 0x2, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfff}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x200}, @exit], &(0x7f0000000200)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x4, '\x00', r3, 0x18, r4, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x7, 0x7fffffff, 0x5}, 0x10, r5, r6}, 0x80) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0x0, 0xfee, 0x10}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x1, &(0x7f0000000540)=@raw=[@ldst={0x3, 0x2, 0x2, 0x2, 0xa, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x3, 0xe3, &(0x7f00000005c0)=""/227, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000006c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x7, 0x6, 0x40, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[0x1, r1]}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/142, 0x5c, 0x8e, 0xfffffffe}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)}, 0x10) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={r2, 0x20, &(0x7f0000000440)={&(0x7f00000002c0)=""/178, 0xb2, 0x0, &(0x7f0000000380)=""/159, 0x9f}}, 0x10) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x8, &(0x7f0000000100)=@raw=[@ldst={0x3, 0x3, 0x2, 0x9, 0xa, 0xfffffffffffffffc, 0x1}, @exit, @ldst={0x1, 0x1, 0x3, 0x2, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfff}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x200}, @exit], &(0x7f0000000200)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x4, '\x00', r3, 0x18, r4, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x7, 0x7fffffff, 0x5}, 0x10, r5, r6}, 0x80) (async) 23:31:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], 0x0, 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x96, 0xe8, 0x1}, 0x20) [ 751.475244][ T2385] FAULT_INJECTION: forcing a failure. [ 751.475244][ T2385] name failslab, interval 1, probability 0, space 0, times 0 [ 751.500070][ T2385] CPU: 0 PID: 2385 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 751.510063][ T2385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 751.519956][ T2385] Call Trace: [ 751.523077][ T2385] [ 751.525856][ T2385] dump_stack_lvl+0x151/0x1b7 [ 751.530370][ T2385] ? bfq_pos_tree_add_move+0x43e/0x43e [ 751.535666][ T2385] dump_stack+0x15/0x17 [ 751.539656][ T2385] should_fail+0x3c0/0x510 [ 751.543907][ T2385] __should_failslab+0x9f/0xe0 [ 751.548507][ T2385] should_failslab+0x9/0x20 [ 751.552847][ T2385] kmem_cache_alloc+0x4f/0x2f0 [ 751.557447][ T2385] ? anon_vma_clone+0xa1/0x4f0 [ 751.562048][ T2385] anon_vma_clone+0xa1/0x4f0 [ 751.566474][ T2385] anon_vma_fork+0x91/0x4f0 [ 751.570814][ T2385] ? anon_vma_name+0x43/0x70 [ 751.575242][ T2385] dup_mmap+0x750/0xea0 [ 751.579233][ T2385] ? __delayed_free_task+0x20/0x20 [ 751.584180][ T2385] ? mm_init+0x807/0x960 [ 751.588258][ T2385] dup_mm+0x91/0x330 [ 751.591999][ T2385] copy_mm+0x108/0x1b0 [ 751.595899][ T2385] copy_process+0x1295/0x3250 [ 751.600415][ T2385] ? proc_fail_nth_write+0x213/0x290 [ 751.605531][ T2385] ? proc_fail_nth_read+0x220/0x220 [ 751.610574][ T2385] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 751.615512][ T2385] ? vfs_write+0x9af/0x1050 [ 751.619853][ T2385] ? vmacache_update+0xb7/0x120 [ 751.624539][ T2385] kernel_clone+0x22d/0x990 [ 751.628886][ T2385] ? file_end_write+0x1b0/0x1b0 [ 751.633565][ T2385] ? __kasan_check_write+0x14/0x20 [ 751.638525][ T2385] ? create_io_thread+0x1e0/0x1e0 [ 751.643372][ T2385] ? __mutex_lock_slowpath+0x10/0x10 [ 751.648496][ T2385] __x64_sys_clone+0x289/0x310 [ 751.653117][ T2385] ? __do_sys_vfork+0x130/0x130 [ 751.657786][ T2385] ? debug_smp_processor_id+0x17/0x20 [ 751.662990][ T2385] do_syscall_64+0x44/0xd0 [ 751.667243][ T2385] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 751.672968][ T2385] RIP: 0033:0x7f14733430a9 [ 751.677226][ T2385] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 751.696675][ T2385] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 751.704918][ T2385] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 751.712722][ T2385] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 751.720537][ T2385] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 751.728345][ T2385] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 751.736153][ T2385] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 751.743977][ T2385] 23:31:25 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 79) 23:31:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:25 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0x0, 0xfee, 0x10}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x1, &(0x7f0000000540)=@raw=[@ldst={0x3, 0x2, 0x2, 0x2, 0xa, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x3, 0xe3, &(0x7f00000005c0)=""/227, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000006c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x7, 0x6, 0x40, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[0x1, r1]}, 0x80) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/142, 0x5c, 0x8e, 0xfffffffe}, 0x20) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={r2, 0x20, &(0x7f0000000440)={&(0x7f00000002c0)=""/178, 0xb2, 0x0, &(0x7f0000000380)=""/159, 0x9f}}, 0x10) (async) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000003380), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x8, &(0x7f0000000100)=@raw=[@ldst={0x3, 0x3, 0x2, 0x9, 0xa, 0xfffffffffffffffc, 0x1}, @exit, @ldst={0x1, 0x1, 0x3, 0x2, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfff}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x200}, @exit], &(0x7f0000000200)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x4, '\x00', r3, 0x18, r4, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x7, 0x7fffffff, 0x5}, 0x10, r5, r6}, 0x80) [ 751.791625][ T2375] cgroup: fork rejected by pids controller in /syz5 [ 751.828731][ T2441] FAULT_INJECTION: forcing a failure. [ 751.828731][ T2441] name failslab, interval 1, probability 0, space 0, times 0 [ 751.841273][ T2441] CPU: 1 PID: 2441 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 751.851256][ T2441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 751.861149][ T2441] Call Trace: [ 751.864272][ T2441] [ 751.867048][ T2441] dump_stack_lvl+0x151/0x1b7 [ 751.871562][ T2441] ? bfq_pos_tree_add_move+0x43e/0x43e [ 751.876859][ T2441] dump_stack+0x15/0x17 [ 751.880851][ T2441] should_fail+0x3c0/0x510 [ 751.885102][ T2441] __should_failslab+0x9f/0xe0 [ 751.889734][ T2441] should_failslab+0x9/0x20 [ 751.894041][ T2441] kmem_cache_alloc+0x4f/0x2f0 [ 751.898644][ T2441] ? anon_vma_clone+0xa1/0x4f0 [ 751.903256][ T2441] anon_vma_clone+0xa1/0x4f0 [ 751.907672][ T2441] anon_vma_fork+0x91/0x4f0 [ 751.912007][ T2441] ? anon_vma_name+0x43/0x70 [ 751.916440][ T2441] dup_mmap+0x750/0xea0 [ 751.920429][ T2441] ? __delayed_free_task+0x20/0x20 [ 751.925373][ T2441] ? mm_init+0x807/0x960 [ 751.929454][ T2441] dup_mm+0x91/0x330 [ 751.933187][ T2441] copy_mm+0x108/0x1b0 [ 751.937093][ T2441] copy_process+0x1295/0x3250 [ 751.941629][ T2441] ? proc_fail_nth_write+0x213/0x290 [ 751.946726][ T2441] ? proc_fail_nth_read+0x220/0x220 [ 751.951776][ T2441] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 751.956704][ T2441] ? vfs_write+0x9af/0x1050 [ 751.961047][ T2441] ? vmacache_update+0xb7/0x120 [ 751.965728][ T2441] kernel_clone+0x22d/0x990 [ 751.970073][ T2441] ? file_end_write+0x1b0/0x1b0 [ 751.974759][ T2441] ? __kasan_check_write+0x14/0x20 [ 751.979736][ T2441] ? create_io_thread+0x1e0/0x1e0 [ 751.984572][ T2441] ? __mutex_lock_slowpath+0x10/0x10 23:31:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01d3185ea5000e00000000a4874cf0a8526de0ba24"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x0, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:25 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/141, 0x5c, 0x8d, 0x21}, 0x20) 23:31:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x0, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x0, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) [ 751.989691][ T2441] __x64_sys_clone+0x289/0x310 [ 751.994289][ T2441] ? __do_sys_vfork+0x130/0x130 [ 751.998975][ T2441] ? debug_smp_processor_id+0x17/0x20 [ 752.004184][ T2441] do_syscall_64+0x44/0xd0 [ 752.008435][ T2441] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 752.014162][ T2441] RIP: 0033:0x7f14733430a9 [ 752.018416][ T2441] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:31:25 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) 23:31:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01d3185ea5000e00000000a4874cf0a8526de0ba24"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:25 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/141, 0x5c, 0x8d, 0x21}, 0x20) [ 752.037857][ T2441] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 752.046103][ T2441] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 752.053916][ T2441] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 752.061724][ T2441] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 752.069535][ T2441] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 752.077346][ T2441] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 752.085162][ T2441] 23:31:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x96, 0xe8, 0x1}, 0x20) 23:31:25 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/141, 0x5c, 0x8d, 0x21}, 0x20) 23:31:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 752.144018][ T2505] FAULT_INJECTION: forcing a failure. [ 752.144018][ T2505] name failslab, interval 1, probability 0, space 0, times 0 [ 752.158500][ T2505] CPU: 0 PID: 2505 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 752.168486][ T2505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 752.178379][ T2505] Call Trace: [ 752.181502][ T2505] [ 752.184279][ T2505] dump_stack_lvl+0x151/0x1b7 [ 752.188793][ T2505] ? bfq_pos_tree_add_move+0x43e/0x43e 23:31:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 752.194088][ T2505] dump_stack+0x15/0x17 [ 752.198082][ T2505] should_fail+0x3c0/0x510 [ 752.202331][ T2505] __should_failslab+0x9f/0xe0 [ 752.207014][ T2505] should_failslab+0x9/0x20 [ 752.211360][ T2505] kmem_cache_alloc+0x4f/0x2f0 [ 752.215960][ T2505] ? anon_vma_fork+0x1b9/0x4f0 [ 752.220559][ T2505] anon_vma_fork+0x1b9/0x4f0 [ 752.224981][ T2505] dup_mmap+0x750/0xea0 [ 752.228973][ T2505] ? __delayed_free_task+0x20/0x20 [ 752.233920][ T2505] ? mm_init+0x807/0x960 [ 752.237999][ T2505] dup_mm+0x91/0x330 [ 752.241732][ T2505] copy_mm+0x108/0x1b0 [ 752.245638][ T2505] copy_process+0x1295/0x3250 [ 752.250149][ T2505] ? proc_fail_nth_write+0x213/0x290 [ 752.255270][ T2505] ? proc_fail_nth_read+0x220/0x220 [ 752.260305][ T2505] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 752.265254][ T2505] ? vfs_write+0x9af/0x1050 [ 752.269592][ T2505] ? vmacache_update+0xb7/0x120 [ 752.274281][ T2505] kernel_clone+0x22d/0x990 [ 752.278619][ T2505] ? file_end_write+0x1b0/0x1b0 [ 752.283305][ T2505] ? __kasan_check_write+0x14/0x20 [ 752.288253][ T2505] ? create_io_thread+0x1e0/0x1e0 [ 752.293119][ T2505] ? __mutex_lock_slowpath+0x10/0x10 [ 752.298237][ T2505] __x64_sys_clone+0x289/0x310 [ 752.302837][ T2505] ? __do_sys_vfork+0x130/0x130 [ 752.307522][ T2505] ? debug_smp_processor_id+0x17/0x20 [ 752.312730][ T2505] do_syscall_64+0x44/0xd0 [ 752.316984][ T2505] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 752.322710][ T2505] RIP: 0033:0x7f14733430a9 [ 752.326963][ T2505] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 752.346404][ T2505] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 752.354648][ T2505] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 752.362461][ T2505] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 752.370271][ T2505] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 752.378084][ T2505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 752.385894][ T2505] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 752.393708][ T2505] [ 752.400510][ T2505] ================================================================== [ 752.408389][ T2505] BUG: KASAN: use-after-free in vm_area_free+0x7e/0x230 [ 752.415156][ T2505] Write of size 4 at addr ffff8881306894f8 by task syz-executor.4/2505 [ 752.423234][ T2505] [ 752.425431][ T2505] CPU: 0 PID: 2505 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 752.435379][ T2505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 752.445276][ T2505] Call Trace: [ 752.448398][ T2505] [ 752.451185][ T2505] dump_stack_lvl+0x151/0x1b7 [ 752.455693][ T2505] ? bfq_pos_tree_add_move+0x43e/0x43e [ 752.460983][ T2505] ? panic+0x727/0x727 [ 752.464889][ T2505] ? slab_free_freelist_hook+0xc9/0x1a0 [ 752.470357][ T2505] print_address_description+0x87/0x3d0 [ 752.475743][ T2505] kasan_report+0x1a6/0x1f0 [ 752.480079][ T2505] ? vm_area_free+0x7e/0x230 [ 752.484505][ T2505] ? vm_area_free+0x7e/0x230 [ 752.488932][ T2505] kasan_check_range+0x2aa/0x2e0 [ 752.493706][ T2505] __kasan_check_write+0x14/0x20 [ 752.498478][ T2505] vm_area_free+0x7e/0x230 [ 752.502743][ T2505] dup_mmap+0xbcd/0xea0 [ 752.506723][ T2505] ? __delayed_free_task+0x20/0x20 [ 752.511670][ T2505] ? mm_init+0x807/0x960 [ 752.515751][ T2505] dup_mm+0x91/0x330 [ 752.519483][ T2505] copy_mm+0x108/0x1b0 [ 752.523399][ T2505] copy_process+0x1295/0x3250 [ 752.527901][ T2505] ? proc_fail_nth_write+0x213/0x290 [ 752.533028][ T2505] ? proc_fail_nth_read+0x220/0x220 [ 752.538061][ T2505] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 752.543002][ T2505] ? vfs_write+0x9af/0x1050 [ 752.547343][ T2505] ? vmacache_update+0xb7/0x120 [ 752.552035][ T2505] kernel_clone+0x22d/0x990 [ 752.556370][ T2505] ? file_end_write+0x1b0/0x1b0 [ 752.561057][ T2505] ? __kasan_check_write+0x14/0x20 [ 752.566003][ T2505] ? create_io_thread+0x1e0/0x1e0 [ 752.570865][ T2505] ? __mutex_lock_slowpath+0x10/0x10 [ 752.575984][ T2505] __x64_sys_clone+0x289/0x310 [ 752.580587][ T2505] ? __do_sys_vfork+0x130/0x130 [ 752.585273][ T2505] ? debug_smp_processor_id+0x17/0x20 [ 752.590488][ T2505] do_syscall_64+0x44/0xd0 [ 752.594733][ T2505] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 752.600461][ T2505] RIP: 0033:0x7f14733430a9 [ 752.604715][ T2505] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 752.624155][ T2505] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 752.632408][ T2505] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 752.640216][ T2505] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 752.648023][ T2505] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 752.655834][ T2505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 752.663669][ T2505] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 752.671458][ T2505] [ 752.674323][ T2505] [ 752.676492][ T2505] Allocated by task 2441: [ 752.680658][ T2505] __kasan_slab_alloc+0xb2/0xe0 [ 752.685344][ T2505] kmem_cache_alloc+0x189/0x2f0 [ 752.690031][ T2505] vm_area_dup+0x26/0x1d0 [ 752.694196][ T2505] dup_mmap+0x6b8/0xea0 [ 752.698189][ T2505] dup_mm+0x91/0x330 [ 752.701920][ T2505] copy_mm+0x108/0x1b0 [ 752.705835][ T2505] copy_process+0x1295/0x3250 [ 752.710339][ T2505] kernel_clone+0x22d/0x990 [ 752.714689][ T2505] __x64_sys_clone+0x289/0x310 [ 752.719284][ T2505] do_syscall_64+0x44/0xd0 [ 752.723534][ T2505] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 752.729261][ T2505] [ 752.731432][ T2505] Freed by task 2493: [ 752.735340][ T2505] kasan_set_track+0x4c/0x70 [ 752.739764][ T2505] kasan_set_free_info+0x23/0x40 [ 752.744536][ T2505] ____kasan_slab_free+0x126/0x160 [ 752.749485][ T2505] __kasan_slab_free+0x11/0x20 [ 752.754089][ T2505] slab_free_freelist_hook+0xc9/0x1a0 [ 752.759297][ T2505] kmem_cache_free+0x11a/0x2e0 [ 752.763900][ T2505] vm_area_free+0x1ae/0x230 [ 752.768235][ T2505] exit_mmap+0x5dd/0x7a0 [ 752.772312][ T2505] __mmput+0x95/0x300 [ 752.776132][ T2505] mmput+0x50/0x60 [ 752.779689][ T2505] exit_mm+0x50d/0x760 [ 752.783594][ T2505] do_exit+0x63c/0x24d0 [ 752.787587][ T2505] __ia32_sys_exit+0x0/0x40 [ 752.791927][ T2505] do_syscall_64+0x44/0xd0 [ 752.796179][ T2505] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 752.801907][ T2505] [ 752.804085][ T2505] The buggy address belongs to the object at ffff8881306894a0 [ 752.804085][ T2505] which belongs to the cache vm_area_struct of size 232 [ 752.818407][ T2505] The buggy address is located 88 bytes inside of [ 752.818407][ T2505] 232-byte region [ffff8881306894a0, ffff888130689588) [ 752.831428][ T2505] The buggy address belongs to the page: [ 752.836889][ T2505] page:ffffea0004c1a240 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x130689 [ 752.846954][ T2505] flags: 0x4000000000000200(slab|zone=1) [ 752.852431][ T2505] raw: 4000000000000200 ffffea000470f900 0000000500000005 ffff888100274780 [ 752.860847][ T2505] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000 [ 752.869265][ T2505] page dumped because: kasan: bad access detected [ 752.875509][ T2505] page_owner tracks the page as allocated [ 752.881067][ T2505] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 28625, ts 738460146634, free_ts 738176276047 [ 752.897126][ T2505] post_alloc_hook+0x1ab/0x1b0 [ 752.901721][ T2505] get_page_from_freelist+0x38b/0x400 [ 752.906930][ T2505] __alloc_pages+0x3a8/0x7c0 [ 752.911372][ T2505] allocate_slab+0x62/0x580 [ 752.915692][ T2505] ___slab_alloc+0x2e2/0x6f0 [ 752.920120][ T2505] __slab_alloc+0x4a/0x90 [ 752.924286][ T2505] kmem_cache_alloc+0x205/0x2f0 [ 752.928972][ T2505] vm_area_dup+0x26/0x1d0 [ 752.933140][ T2505] dup_mmap+0x6b8/0xea0 [ 752.937564][ T2505] dup_mm+0x91/0x330 [ 752.941299][ T2505] copy_mm+0x108/0x1b0 [ 752.945204][ T2505] copy_process+0x1295/0x3250 [ 752.949818][ T2505] kernel_clone+0x22d/0x990 [ 752.954155][ T2505] __x64_sys_clone+0x289/0x310 [ 752.958759][ T2505] do_syscall_64+0x44/0xd0 [ 752.963012][ T2505] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 752.968741][ T2505] page last free stack trace: [ 752.973254][ T2505] free_pcp_prepare+0x448/0x450 [ 752.977936][ T2505] free_unref_page+0x9c/0x370 [ 752.982450][ T2505] __free_pages+0xd8/0x100 [ 752.986710][ T2505] __vunmap+0x846/0x980 [ 752.990697][ T2505] vfree+0x7f/0xb0 [ 752.994262][ T2505] kvfree+0x26/0x40 [ 752.997899][ T2505] btf_new_fd+0x4cb/0x900 [ 753.002069][ T2505] bpf_btf_load+0x6f/0x90 [ 753.006236][ T2505] __sys_bpf+0x514/0x750 [ 753.010312][ T2505] __x64_sys_bpf+0x7c/0x90 [ 753.014564][ T2505] do_syscall_64+0x44/0xd0 [ 753.018815][ T2505] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 753.024548][ T2505] [ 753.026729][ T2505] Memory state around the buggy address: [ 753.032222][ T2505] ffff888130689380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 753.040084][ T2505] ffff888130689400: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc 23:31:26 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) 23:31:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x96, 0xe8, 0x1}, 0x20) 23:31:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01d3185ea5000e00000000a4874cf0a8526de0ba24"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:26 executing program 5: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/64) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f00000001c0)=""/141, 0xffffffffffffffbe, 0x8d, 0x1}, 0xfffffffffffffe8f) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xe, 0x1}, {0x9, 0x3}, {0xb, 0x1}]}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x4, 0x1}, {0x9, 0x2}, {0x8, 0x5}, {0x10, 0x4}, {0x3, 0x1}, {0x2, 0x3}, {0x7, 0x1}, {0x6, 0x1}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5, 0x200000}}]}, {0x0, [0x5f, 0x5f, 0x0, 0x30, 0x30, 0x30]}}, &(0x7f0000000340)=""/72, 0xa8, 0x48}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f00000000c0)}, 0x10) 23:31:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/141, 0x5c, 0x8d}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000003380), 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000380)="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", &(0x7f00000001c0)=""/196}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='net_cls.classid\x00', 0x2, 0x0) 23:31:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x96, 0xe8, 0x1}, 0x20) 23:31:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 753.047984][ T2505] >ffff888130689480: fc fc fc fc fa fb fb fb fb fb fb fb fb fb fb fb [ 753.055878][ T2505] ^ [ 753.063691][ T2505] ffff888130689500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 753.071680][ T2505] ffff888130689580: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 753.079572][ T2505] ================================================================== [ 753.087476][ T2505] Disabling lock debugging due to kernel taint 23:31:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/141, 0x5c, 0x8d}, 0x20) (async) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000003380), 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000380)="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", &(0x7f00000001c0)=""/196}, 0x20) (async) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='net_cls.classid\x00', 0x2, 0x0) 23:31:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 753.153965][ T2539] FAULT_INJECTION: forcing a failure. [ 753.153965][ T2539] name failslab, interval 1, probability 0, space 0, times 0 [ 753.175881][ T2539] CPU: 0 PID: 2539 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 753.187262][ T2539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 753.197155][ T2539] Call Trace: [ 753.200274][ T2539] [ 753.203055][ T2539] dump_stack_lvl+0x151/0x1b7 [ 753.207567][ T2539] ? bfq_pos_tree_add_move+0x43e/0x43e [ 753.212864][ T2539] ? do_syscall_64+0x44/0xd0 [ 753.217289][ T2539] dump_stack+0x15/0x17 [ 753.221287][ T2539] should_fail+0x3c0/0x510 [ 753.225534][ T2539] __should_failslab+0x9f/0xe0 [ 753.230133][ T2539] should_failslab+0x9/0x20 [ 753.234474][ T2539] kmem_cache_alloc+0x4f/0x2f0 [ 753.239073][ T2539] ? anon_vma_clone+0xa1/0x4f0 [ 753.243674][ T2539] anon_vma_clone+0xa1/0x4f0 [ 753.248102][ T2539] anon_vma_fork+0x91/0x4f0 [ 753.252701][ T2539] ? anon_vma_name+0x4c/0x70 [ 753.257128][ T2539] dup_mmap+0x750/0xea0 [ 753.261119][ T2539] ? __delayed_free_task+0x20/0x20 [ 753.266069][ T2539] ? mm_init+0x807/0x960 [ 753.270144][ T2539] dup_mm+0x91/0x330 [ 753.273892][ T2539] copy_mm+0x108/0x1b0 [ 753.277784][ T2539] copy_process+0x1295/0x3250 [ 753.282298][ T2539] ? proc_fail_nth_write+0x213/0x290 [ 753.287422][ T2539] ? proc_fail_nth_read+0x220/0x220 [ 753.292451][ T2539] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 753.297399][ T2539] ? vfs_write+0x9af/0x1050 [ 753.301738][ T2539] ? vmacache_update+0xb7/0x120 [ 753.306425][ T2539] kernel_clone+0x22d/0x990 [ 753.310767][ T2539] ? file_end_write+0x1b0/0x1b0 [ 753.315451][ T2539] ? __kasan_check_write+0x14/0x20 [ 753.320410][ T2539] ? create_io_thread+0x1e0/0x1e0 [ 753.325265][ T2539] ? __mutex_lock_slowpath+0x10/0x10 [ 753.330394][ T2539] __x64_sys_clone+0x289/0x310 [ 753.334982][ T2539] ? __do_sys_vfork+0x130/0x130 [ 753.339668][ T2539] ? debug_smp_processor_id+0x17/0x20 [ 753.344873][ T2539] do_syscall_64+0x44/0xd0 [ 753.349130][ T2539] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 753.354865][ T2539] RIP: 0033:0x7f14733430a9 [ 753.359111][ T2539] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 753.378724][ T2539] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 753.386969][ T2539] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 753.394784][ T2539] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:26 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 82) 23:31:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:26 executing program 5: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/64) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x1}, 0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f00000001c0)=""/141, 0xffffffffffffffbe, 0x8d, 0x1}, 0xfffffffffffffe8f) (async) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xe, 0x1}, {0x9, 0x3}, {0xb, 0x1}]}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x4, 0x1}, {0x9, 0x2}, {0x8, 0x5}, {0x10, 0x4}, {0x3, 0x1}, {0x2, 0x3}, {0x7, 0x1}, {0x6, 0x1}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5, 0x200000}}]}, {0x0, [0x5f, 0x5f, 0x0, 0x30, 0x30, 0x30]}}, &(0x7f0000000340)=""/72, 0xa8, 0x48}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f00000000c0)}, 0x10) 23:31:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@union={0x1, 0x9, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x96, 0xe8, 0x1}, 0x20) 23:31:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/141, 0x5c, 0x8d}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000003380), 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000380)="067135d4e40a9f65d371fd6bfe2b5a3bd5b90e1140d210d759654a6a80125122558be7cbab642c3f14f0734121136ef079c296e6fc13863f4d3593dc40696514a63440ace948a23b62712890ca454baecc9942ccfdfbb036197c5d7efcc2e18c6cb01fd887b9dbe3cfba68b68bd34ac3e90a6b3b97c5f9df0f90b64886a951969ee61153dc6093c94479bddcd081328778a38fa7460e0d59efc63f65f386c0d8f753a25297599acc154ed60e96d0c4f736eca622bb941bd9287904866e89dc7da2f583f8f4d972c9a2d9440000000000000000000000000000000000000000000000000000006e5bbc9be348f4527da038923ba55ca8c9bad29c88c1fb7549944903906dcca14fc50e1434f5ce10e6f38bd7d71e249606c91ed47e9c680e5c06474600377bc251b0e7415bf7342677dd34b64fb2261a3dbf72c5a22f9bd5a1c389785df5f9aaa1738f8d36d694b8360fd2daa72e059cd5785027b883ad9c71e7e4434ed15cd1807353ce0422ebfbbacc60bc79c5ac22fd1aaab0862156f25c6effb3e2c453b05a065d7c61106fae57fc79be0c4b30ee651d7c08663373f8c6aac96d13656c01bd90fe63074381a693bd0ce1e3a3d5b80b2ccf832c03156409712aeea9be25d8c1adfcf32f50371644320bbf5492e2344b201dbd5a2749976c0b5745e933221ea7ee171f2408b315a10572b022f93d218aa7c3d70e2ab8dd1f32a390734405ea3b6704e5cbfe2b3cab", &(0x7f00000001c0)=""/196}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='net_cls.classid\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/141, 0x5c, 0x8d}, 0x20) (async) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000003380), 0x2, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000380)="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", &(0x7f00000001c0)=""/196}, 0x20) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000000000)='net_cls.classid\x00', 0x2, 0x0) (async) 23:31:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x1, &(0x7f0000000700)=@raw=[@call], &(0x7f0000000740)='GPL\x00', 0x3, 0xb3, &(0x7f0000000780)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 753.402591][ T2539] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 753.410404][ T2539] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 753.418223][ T2539] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 753.426030][ T2539] 23:31:26 executing program 5: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/64) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x1}, 0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f00000001c0)=""/141, 0xffffffffffffffbe, 0x8d, 0x1}, 0xfffffffffffffe8f) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xe, 0x1}, {0x9, 0x3}, {0xb, 0x1}]}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x4, 0x1}, {0x9, 0x2}, {0x8, 0x5}, {0x10, 0x4}, {0x3, 0x1}, {0x2, 0x3}, {0x7, 0x1}, {0x6, 0x1}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5, 0x200000}}]}, {0x0, [0x5f, 0x5f, 0x0, 0x30, 0x30, 0x30]}}, &(0x7f0000000340)=""/72, 0xa8, 0x48}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f00000000c0)}, 0x10) 23:31:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x6, [@union={0x1, 0x8, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x8a, 0xe8, 0x1}, 0x20) 23:31:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x96, 0xe8, 0x1}, 0x20) 23:31:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x96, 0xe8, 0x1}, 0x20) 23:31:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) mkdir(&(0x7f0000000140)='./file0\x00', 0x1) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000040)=r0, 0x4) [ 753.498124][ T2568] FAULT_INJECTION: forcing a failure. [ 753.498124][ T2568] name failslab, interval 1, probability 0, space 0, times 0 [ 753.535563][ T2568] CPU: 0 PID: 2568 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 753.546946][ T2568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 753.556849][ T2568] Call Trace: [ 753.559966][ T2568] [ 753.562842][ T2568] dump_stack_lvl+0x151/0x1b7 [ 753.567351][ T2568] ? bfq_pos_tree_add_move+0x43e/0x43e [ 753.572644][ T2568] ? do_syscall_64+0x44/0xd0 [ 753.577160][ T2568] dump_stack+0x15/0x17 [ 753.581155][ T2568] should_fail+0x3c0/0x510 [ 753.585406][ T2568] __should_failslab+0x9f/0xe0 [ 753.590001][ T2568] should_failslab+0x9/0x20 [ 753.594350][ T2568] kmem_cache_alloc+0x4f/0x2f0 [ 753.598945][ T2568] ? anon_vma_clone+0xa1/0x4f0 [ 753.603540][ T2568] anon_vma_clone+0xa1/0x4f0 [ 753.607967][ T2568] anon_vma_fork+0x91/0x4f0 [ 753.612317][ T2568] ? anon_vma_name+0x4c/0x70 [ 753.616739][ T2568] dup_mmap+0x750/0xea0 [ 753.620727][ T2568] ? __delayed_free_task+0x20/0x20 [ 753.625675][ T2568] ? mm_init+0x807/0x960 [ 753.629753][ T2568] dup_mm+0x91/0x330 [ 753.633486][ T2568] copy_mm+0x108/0x1b0 [ 753.637389][ T2568] copy_process+0x1295/0x3250 [ 753.641904][ T2568] ? proc_fail_nth_write+0x213/0x290 [ 753.647025][ T2568] ? proc_fail_nth_read+0x220/0x220 [ 753.652060][ T2568] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 753.657005][ T2568] ? vfs_write+0x9af/0x1050 [ 753.661346][ T2568] ? vmacache_update+0xb7/0x120 [ 753.666033][ T2568] kernel_clone+0x22d/0x990 [ 753.670373][ T2568] ? file_end_write+0x1b0/0x1b0 [ 753.675058][ T2568] ? __kasan_check_write+0x14/0x20 [ 753.680009][ T2568] ? create_io_thread+0x1e0/0x1e0 [ 753.684866][ T2568] ? __mutex_lock_slowpath+0x10/0x10 [ 753.689988][ T2568] __x64_sys_clone+0x289/0x310 [ 753.694590][ T2568] ? __do_sys_vfork+0x130/0x130 [ 753.699277][ T2568] ? debug_smp_processor_id+0x17/0x20 [ 753.704482][ T2568] do_syscall_64+0x44/0xd0 [ 753.708742][ T2568] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 753.714461][ T2568] RIP: 0033:0x7f14733430a9 [ 753.718715][ T2568] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 753.738165][ T2568] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:27 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 83) 23:31:27 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'wg0\x00', 0x8100}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x336) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, &(0x7f0000000300)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x16}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000001}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x2c, &(0x7f0000000140)=""/44, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0xa, 0x1000, 0x1f80}, 0x10}, 0x80) 23:31:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x6, [@union={0x1, 0x7, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x7e, 0xe8, 0x1}, 0x20) 23:31:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) mkdir(&(0x7f0000000140)='./file0\x00', 0x1) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000040)=r0, 0x4) 23:31:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x8, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x96, 0xe8, 0x1}, 0x20) 23:31:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x6, [@union={0x1, 0x6, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x72, 0xe8, 0x1}, 0x20) [ 753.746491][ T2568] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 753.754307][ T2568] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 753.762114][ T2568] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 753.769924][ T2568] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 753.777740][ T2568] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 753.785551][ T2568] 23:31:27 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'wg0\x00', 0x8100}) (async) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x336) (async) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, &(0x7f0000000300)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x16}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000001}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x2c, &(0x7f0000000140)=""/44, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0xa, 0x1000, 0x1f80}, 0x10}, 0x80) 23:31:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) mkdir(&(0x7f0000000140)='./file0\x00', 0x1) (async, rerun: 32) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (rerun: 32) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000040)=r0, 0x4) 23:31:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 753.850282][ T2599] FAULT_INJECTION: forcing a failure. [ 753.850282][ T2599] name failslab, interval 1, probability 0, space 0, times 0 [ 753.871371][ T2599] CPU: 1 PID: 2599 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 753.882756][ T2599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 753.892653][ T2599] Call Trace: [ 753.895769][ T2599] [ 753.898549][ T2599] dump_stack_lvl+0x151/0x1b7 [ 753.903058][ T2599] ? bfq_pos_tree_add_move+0x43e/0x43e [ 753.908358][ T2599] dump_stack+0x15/0x17 [ 753.912345][ T2599] should_fail+0x3c0/0x510 [ 753.916599][ T2599] __should_failslab+0x9f/0xe0 [ 753.921201][ T2599] should_failslab+0x9/0x20 [ 753.925536][ T2599] kmem_cache_alloc+0x4f/0x2f0 [ 753.930149][ T2599] ? vm_area_dup+0x26/0x1d0 [ 753.934479][ T2599] vm_area_dup+0x26/0x1d0 [ 753.938645][ T2599] dup_mmap+0x6b8/0xea0 [ 753.942638][ T2599] ? __delayed_free_task+0x20/0x20 [ 753.947583][ T2599] ? mm_init+0x807/0x960 [ 753.951664][ T2599] dup_mm+0x91/0x330 [ 753.955399][ T2599] copy_mm+0x108/0x1b0 [ 753.959300][ T2599] copy_process+0x1295/0x3250 [ 753.963812][ T2599] ? proc_fail_nth_write+0x213/0x290 [ 753.968933][ T2599] ? proc_fail_nth_read+0x220/0x220 [ 753.973968][ T2599] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 753.978914][ T2599] ? vfs_write+0x9af/0x1050 [ 753.983255][ T2599] ? vmacache_update+0xb7/0x120 [ 753.987943][ T2599] kernel_clone+0x22d/0x990 [ 753.992280][ T2599] ? file_end_write+0x1b0/0x1b0 [ 753.996969][ T2599] ? __kasan_check_write+0x14/0x20 [ 754.001915][ T2599] ? create_io_thread+0x1e0/0x1e0 [ 754.006773][ T2599] ? __mutex_lock_slowpath+0x10/0x10 [ 754.011898][ T2599] __x64_sys_clone+0x289/0x310 [ 754.016496][ T2599] ? __do_sys_vfork+0x130/0x130 [ 754.021187][ T2599] ? debug_smp_processor_id+0x17/0x20 [ 754.026389][ T2599] do_syscall_64+0x44/0xd0 [ 754.030645][ T2599] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 754.036385][ T2599] RIP: 0033:0x7f14733430a9 [ 754.040626][ T2599] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 754.060068][ T2599] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 754.068315][ T2599] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 754.076122][ T2599] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 754.083936][ T2599] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.091749][ T2599] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:27 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 84) 23:31:27 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'wg0\x00', 0x8100}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x336) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, &(0x7f0000000300)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x16}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000001}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x2c, &(0x7f0000000140)=""/44, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0xa, 0x1000, 0x1f80}, 0x10}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'wg0\x00', 0x8100}) (async) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x336) (async) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, &(0x7f0000000300)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x16}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000001}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x2c, &(0x7f0000000140)=""/44, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0xa, 0x1000, 0x1f80}, 0x10}, 0x80) (async) 23:31:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@union={0x1, 0x5, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x66, 0xe8, 0x1}, 0x20) 23:31:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:27 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3, 0x7b, 0x6f, 0x80, 0x0, 0xffff, 0x40800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x100, 0x2, @perf_config_ext={0x400, 0x7}, 0x2971, 0x3, 0x8, 0x1, 0x8000000000000001, 0x800, 0x7d99, 0x0, 0x4, 0x0, 0xa2}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 23:31:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:27 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r1 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3, 0x7b, 0x6f, 0x80, 0x0, 0xffff, 0x40800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x100, 0x2, @perf_config_ext={0x400, 0x7}, 0x2971, 0x3, 0x8, 0x1, 0x8000000000000001, 0x800, 0x7d99, 0x0, 0x4, 0x0, 0xa2}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 23:31:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@union={0x1, 0x4, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x5a, 0xe8, 0x1}, 0x20) 23:31:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 754.099558][ T2599] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 754.107461][ T2599] 23:31:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@union={0x1, 0x3, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x4e, 0xe8, 0x1}, 0x20) [ 754.156152][ T2628] FAULT_INJECTION: forcing a failure. [ 754.156152][ T2628] name failslab, interval 1, probability 0, space 0, times 0 [ 754.176098][ T2628] CPU: 0 PID: 2628 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 754.187475][ T2628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 754.197369][ T2628] Call Trace: [ 754.200494][ T2628] [ 754.203271][ T2628] dump_stack_lvl+0x151/0x1b7 [ 754.207785][ T2628] ? bfq_pos_tree_add_move+0x43e/0x43e [ 754.213076][ T2628] dump_stack+0x15/0x17 [ 754.217068][ T2628] should_fail+0x3c0/0x510 [ 754.221330][ T2628] __should_failslab+0x9f/0xe0 [ 754.225918][ T2628] should_failslab+0x9/0x20 [ 754.230256][ T2628] kmem_cache_alloc+0x4f/0x2f0 [ 754.235208][ T2628] ? vm_area_dup+0x26/0x1d0 [ 754.239548][ T2628] vm_area_dup+0x26/0x1d0 [ 754.243719][ T2628] dup_mmap+0x6b8/0xea0 [ 754.247703][ T2628] ? __delayed_free_task+0x20/0x20 [ 754.252736][ T2628] ? mm_init+0x807/0x960 [ 754.256818][ T2628] dup_mm+0x91/0x330 [ 754.260548][ T2628] copy_mm+0x108/0x1b0 [ 754.264456][ T2628] copy_process+0x1295/0x3250 [ 754.268968][ T2628] ? proc_fail_nth_write+0x213/0x290 [ 754.274089][ T2628] ? proc_fail_nth_read+0x220/0x220 [ 754.279223][ T2628] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 754.284170][ T2628] ? vfs_write+0x9af/0x1050 [ 754.288598][ T2628] ? vmacache_update+0xb7/0x120 [ 754.293284][ T2628] kernel_clone+0x22d/0x990 [ 754.297623][ T2628] ? file_end_write+0x1b0/0x1b0 [ 754.302309][ T2628] ? __kasan_check_write+0x14/0x20 [ 754.307257][ T2628] ? create_io_thread+0x1e0/0x1e0 [ 754.312121][ T2628] ? __mutex_lock_slowpath+0x10/0x10 [ 754.317240][ T2628] __x64_sys_clone+0x289/0x310 [ 754.321839][ T2628] ? __do_sys_vfork+0x130/0x130 [ 754.326525][ T2628] ? debug_smp_processor_id+0x17/0x20 [ 754.331733][ T2628] do_syscall_64+0x44/0xd0 [ 754.336073][ T2628] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 754.341803][ T2628] RIP: 0033:0x7f14733430a9 [ 754.346055][ T2628] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 754.365496][ T2628] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 754.373740][ T2628] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 754.381554][ T2628] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 754.389369][ T2628] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.397181][ T2628] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:27 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 85) 23:31:27 executing program 0: bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000001240)=""/151, 0xfd, 0xffffff6a, 0x1}, 0x56) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0xffff, 0x14}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f00000001c0)="4a94387549c6353708485c3b5a52ea4ca3f66b25b619031cc4838bb74f0205e0cb00380746908d9252a88e7c31b537d7d831d40670338a5074ba732179b1912d9a079f47033c82c2f4ba38ac73694339910e4706d34fe5258caf", &(0x7f0000000240)=""/4096}, 0x20) 23:31:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@union={0x1, 0x2, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x42, 0xe8, 0x1}, 0x20) 23:31:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:27 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r1 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3, 0x7b, 0x6f, 0x80, 0x0, 0xffff, 0x40800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x100, 0x2, @perf_config_ext={0x400, 0x7}, 0x2971, 0x3, 0x8, 0x1, 0x8000000000000001, 0x800, 0x7d99, 0x0, 0x4, 0x0, 0xa2}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 23:31:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x1, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x500}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@ptr={0xc, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x61, 0x10, 0x61, 0x0]}}, &(0x7f00000001c0)=""/88, 0x2a, 0x58}, 0x20) 23:31:27 executing program 0: bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000001240)=""/151, 0xfd, 0xffffff6a, 0x1}, 0x56) (async) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0xffff, 0x14}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f00000001c0)="4a94387549c6353708485c3b5a52ea4ca3f66b25b619031cc4838bb74f0205e0cb00380746908d9252a88e7c31b537d7d831d40670338a5074ba732179b1912d9a079f47033c82c2f4ba38ac73694339910e4706d34fe5258caf", &(0x7f0000000240)=""/4096}, 0x20) [ 754.404985][ T2628] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 754.412801][ T2628] 23:31:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x600}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 754.462293][ T2656] FAULT_INJECTION: forcing a failure. [ 754.462293][ T2656] name failslab, interval 1, probability 0, space 0, times 0 [ 754.511885][ T2656] CPU: 1 PID: 2656 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 754.523264][ T2656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 754.533165][ T2656] Call Trace: [ 754.536281][ T2656] [ 754.539064][ T2656] dump_stack_lvl+0x151/0x1b7 [ 754.543570][ T2656] ? bfq_pos_tree_add_move+0x43e/0x43e [ 754.548878][ T2656] ? cred_has_capability+0x2ca/0x420 [ 754.553984][ T2656] dump_stack+0x15/0x17 [ 754.557978][ T2656] should_fail+0x3c0/0x510 [ 754.562231][ T2656] __should_failslab+0x9f/0xe0 [ 754.566831][ T2656] should_failslab+0x9/0x20 [ 754.571170][ T2656] kmem_cache_alloc+0x4f/0x2f0 [ 754.575772][ T2656] ? create_new_namespaces+0x35/0x6e0 [ 754.580979][ T2656] create_new_namespaces+0x35/0x6e0 [ 754.586012][ T2656] ? security_capable+0xb2/0xd0 [ 754.590717][ T2656] copy_namespaces+0x1d1/0x220 [ 754.595300][ T2656] ? copy_mm+0x119/0x1b0 [ 754.599378][ T2656] copy_process+0x12dd/0x3250 [ 754.603892][ T2656] ? proc_fail_nth_write+0x213/0x290 [ 754.609017][ T2656] ? proc_fail_nth_read+0x220/0x220 [ 754.614049][ T2656] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 754.618994][ T2656] ? vfs_write+0x9af/0x1050 [ 754.623336][ T2656] ? vmacache_update+0xb7/0x120 [ 754.628022][ T2656] kernel_clone+0x22d/0x990 [ 754.632362][ T2656] ? file_end_write+0x1b0/0x1b0 [ 754.637047][ T2656] ? __kasan_check_write+0x14/0x20 [ 754.641997][ T2656] ? create_io_thread+0x1e0/0x1e0 [ 754.646855][ T2656] ? __mutex_lock_slowpath+0x10/0x10 [ 754.651989][ T2656] __x64_sys_clone+0x289/0x310 [ 754.656579][ T2656] ? __do_sys_vfork+0x130/0x130 [ 754.661351][ T2656] ? debug_smp_processor_id+0x17/0x20 [ 754.666558][ T2656] do_syscall_64+0x44/0xd0 [ 754.670897][ T2656] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 754.676624][ T2656] RIP: 0033:0x7f14733430a9 [ 754.680883][ T2656] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 754.700322][ T2656] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:28 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 86) 23:31:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@ptr={0xc, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x61, 0x10, 0x61, 0x0]}}, &(0x7f00000001c0)=""/88, 0x2a, 0x58}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@ptr={0xc, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x61, 0x10, 0x61, 0x0]}}, &(0x7f00000001c0)=""/88, 0x2a, 0x58}, 0x20) (async) 23:31:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x1}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x2a, 0xe8, 0x1}, 0x20) 23:31:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:28 executing program 0: bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000001240)=""/151, 0xfd, 0xffffff6a, 0x1}, 0x56) (async, rerun: 64) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0xffff, 0x14}, 0xc) (rerun: 64) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f00000001c0)="4a94387549c6353708485c3b5a52ea4ca3f66b25b619031cc4838bb74f0205e0cb00380746908d9252a88e7c31b537d7d831d40670338a5074ba732179b1912d9a079f47033c82c2f4ba38ac73694339910e4706d34fe5258caf", &(0x7f0000000240)=""/4096}, 0x20) 23:31:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x700}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x30, 0x30, 0x30]}}, &(0x7f00000002c0)=""/232, 0x29, 0xe8, 0x1}, 0x20) 23:31:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@ptr={0xc, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x61, 0x10, 0x61, 0x0]}}, &(0x7f00000001c0)=""/88, 0x2a, 0x58}, 0x20) 23:31:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 754.708567][ T2656] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 754.716388][ T2656] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 754.724188][ T2656] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.732001][ T2656] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 754.739812][ T2656] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 754.747625][ T2656] 23:31:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:28 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xa, &(0x7f00000017c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x4, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1ff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x3a}, @exit, @map_idx={0x18, 0x1, 0x5, 0x0, 0x5}]}, &(0x7f0000001840)='GPL\x00', 0x10001, 0x91, &(0x7f0000001880)=""/145, 0x41000, 0xc, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000001940)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001980)={0x0, 0x2, 0x8, 0x8a}, 0x10}, 0x80) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000300)=""/162, 0xa2}, {&(0x7f00000003c0)=""/123, 0x7b}, {&(0x7f0000000440)=""/144, 0x90}, {&(0x7f0000000500)=""/176, 0xb0}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001640)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x130}, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@fwd={0x3}, @restrict={0x9, 0x0, 0x0, 0xb, 0x5}, @func={0x3, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x2e, 0x61, 0x61]}}, &(0x7f00000001c0)=""/157, 0x41, 0x9d, 0x1}, 0x20) [ 754.804812][ T2687] FAULT_INJECTION: forcing a failure. [ 754.804812][ T2687] name failslab, interval 1, probability 0, space 0, times 0 [ 754.827290][ T2687] CPU: 0 PID: 2687 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 754.838669][ T2687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 754.848564][ T2687] Call Trace: [ 754.851863][ T2687] [ 754.854638][ T2687] dump_stack_lvl+0x151/0x1b7 [ 754.859155][ T2687] ? bfq_pos_tree_add_move+0x43e/0x43e [ 754.864444][ T2687] dump_stack+0x15/0x17 [ 754.868435][ T2687] should_fail+0x3c0/0x510 [ 754.872687][ T2687] __should_failslab+0x9f/0xe0 [ 754.877287][ T2687] should_failslab+0x9/0x20 [ 754.881627][ T2687] kmem_cache_alloc+0x4f/0x2f0 [ 754.886228][ T2687] ? anon_vma_fork+0x1b9/0x4f0 [ 754.890835][ T2687] anon_vma_fork+0x1b9/0x4f0 [ 754.895260][ T2687] dup_mmap+0x750/0xea0 [ 754.899247][ T2687] ? __delayed_free_task+0x20/0x20 [ 754.904197][ T2687] ? mm_init+0x807/0x960 [ 754.908278][ T2687] dup_mm+0x91/0x330 [ 754.912010][ T2687] copy_mm+0x108/0x1b0 [ 754.915911][ T2687] copy_process+0x1295/0x3250 [ 754.920425][ T2687] ? proc_fail_nth_write+0x213/0x290 [ 754.925545][ T2687] ? proc_fail_nth_read+0x220/0x220 [ 754.930578][ T2687] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 754.935526][ T2687] ? vfs_write+0x9af/0x1050 [ 754.939863][ T2687] ? vmacache_update+0xb7/0x120 [ 754.944551][ T2687] kernel_clone+0x22d/0x990 [ 754.948891][ T2687] ? file_end_write+0x1b0/0x1b0 [ 754.953578][ T2687] ? __kasan_check_write+0x14/0x20 [ 754.958529][ T2687] ? create_io_thread+0x1e0/0x1e0 [ 754.963386][ T2687] ? __mutex_lock_slowpath+0x10/0x10 [ 754.968506][ T2687] __x64_sys_clone+0x289/0x310 [ 754.973118][ T2687] ? __do_sys_vfork+0x130/0x130 [ 754.977793][ T2687] ? debug_smp_processor_id+0x17/0x20 [ 754.983001][ T2687] do_syscall_64+0x44/0xd0 [ 754.987260][ T2687] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 754.992982][ T2687] RIP: 0033:0x7f14733430a9 [ 754.997236][ T2687] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 755.016685][ T2687] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 755.024921][ T2687] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 755.032730][ T2687] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 755.040542][ T2687] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:28 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 87) 23:31:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x30, 0x30]}}, &(0x7f00000002c0)=""/232, 0x28, 0xe8, 0x1}, 0x20) 23:31:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:28 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xa, &(0x7f00000017c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x4, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1ff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x3a}, @exit, @map_idx={0x18, 0x1, 0x5, 0x0, 0x5}]}, &(0x7f0000001840)='GPL\x00', 0x10001, 0x91, &(0x7f0000001880)=""/145, 0x41000, 0xc, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000001940)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001980)={0x0, 0x2, 0x8, 0x8a}, 0x10}, 0x80) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000300)=""/162, 0xa2}, {&(0x7f00000003c0)=""/123, 0x7b}, {&(0x7f0000000440)=""/144, 0x90}, {&(0x7f0000000500)=""/176, 0xb0}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001640)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x130}, 0x3) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@fwd={0x3}, @restrict={0x9, 0x0, 0x0, 0xb, 0x5}, @func={0x3, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x2e, 0x61, 0x61]}}, &(0x7f00000001c0)=""/157, 0x41, 0x9d, 0x1}, 0x20) 23:31:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x30]}}, &(0x7f00000002c0)=""/232, 0x27, 0xe8, 0x1}, 0x20) 23:31:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1004000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 755.048357][ T2687] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 755.056167][ T2687] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 755.063980][ T2687] 23:31:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}, {0xd, 0x3, 0x205}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x96, 0xe8, 0x1}, 0x20) 23:31:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:28 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xa, &(0x7f00000017c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x4, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1ff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x3a}, @exit, @map_idx={0x18, 0x1, 0x5, 0x0, 0x5}]}, &(0x7f0000001840)='GPL\x00', 0x10001, 0x91, &(0x7f0000001880)=""/145, 0x41000, 0xc, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000001940)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001980)={0x0, 0x2, 0x8, 0x8a}, 0x10}, 0x80) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000300)=""/162, 0xa2}, {&(0x7f00000003c0)=""/123, 0x7b}, {&(0x7f0000000440)=""/144, 0x90}, {&(0x7f0000000500)=""/176, 0xb0}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001640)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x130}, 0x3) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@fwd={0x3}, @restrict={0x9, 0x0, 0x0, 0xb, 0x5}, @func={0x3, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x2e, 0x61, 0x61]}}, &(0x7f00000001c0)=""/157, 0x41, 0x9d, 0x1}, 0x20) [ 755.107764][ T2714] FAULT_INJECTION: forcing a failure. [ 755.107764][ T2714] name failslab, interval 1, probability 0, space 0, times 0 [ 755.128134][ T2714] CPU: 0 PID: 2714 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 755.139510][ T2714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 755.149404][ T2714] Call Trace: [ 755.152523][ T2714] [ 755.155300][ T2714] dump_stack_lvl+0x151/0x1b7 [ 755.159815][ T2714] ? bfq_pos_tree_add_move+0x43e/0x43e [ 755.165112][ T2714] dump_stack+0x15/0x17 [ 755.169186][ T2714] should_fail+0x3c0/0x510 [ 755.173444][ T2714] __should_failslab+0x9f/0xe0 [ 755.178037][ T2714] should_failslab+0x9/0x20 [ 755.182375][ T2714] kmem_cache_alloc+0x4f/0x2f0 [ 755.186978][ T2714] ? vm_area_dup+0x26/0x1d0 [ 755.191321][ T2714] vm_area_dup+0x26/0x1d0 [ 755.195481][ T2714] dup_mmap+0x6b8/0xea0 [ 755.199484][ T2714] ? __delayed_free_task+0x20/0x20 [ 755.204425][ T2714] ? mm_init+0x807/0x960 [ 755.208501][ T2714] dup_mm+0x91/0x330 [ 755.212232][ T2714] copy_mm+0x108/0x1b0 [ 755.216137][ T2714] copy_process+0x1295/0x3250 [ 755.220658][ T2714] ? proc_fail_nth_write+0x213/0x290 [ 755.225773][ T2714] ? proc_fail_nth_read+0x220/0x220 [ 755.230806][ T2714] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 755.235763][ T2714] ? vfs_write+0x9af/0x1050 [ 755.240093][ T2714] ? vmacache_update+0xb7/0x120 [ 755.244789][ T2714] kernel_clone+0x22d/0x990 [ 755.249122][ T2714] ? file_end_write+0x1b0/0x1b0 [ 755.253806][ T2714] ? __kasan_check_write+0x14/0x20 [ 755.258760][ T2714] ? create_io_thread+0x1e0/0x1e0 [ 755.263627][ T2714] ? __mutex_lock_slowpath+0x10/0x10 [ 755.268738][ T2714] __x64_sys_clone+0x289/0x310 [ 755.273336][ T2714] ? __do_sys_vfork+0x130/0x130 [ 755.278021][ T2714] ? debug_smp_processor_id+0x17/0x20 [ 755.283228][ T2714] do_syscall_64+0x44/0xd0 [ 755.287481][ T2714] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 755.293209][ T2714] RIP: 0033:0x7f14733430a9 [ 755.297476][ T2714] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 755.316907][ T2714] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 755.325149][ T2714] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 755.332964][ T2714] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 755.340773][ T2714] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 755.348584][ T2714] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:28 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 88) 23:31:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x6, [@union={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}, {0xd, 0x1, 0x8000000}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x8a, 0xe8, 0x1}, 0x20) 23:31:28 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/193, 0xc1, 0x0, &(0x7f00000002c0)=""/237, 0xed}}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r1, 0xe, 0x1, 0x9, &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r2, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r4, 0x0, r2, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r5}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r6}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r2, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002bc0)=0xffffffffffffffff, 0x4) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r6, r6]}, 0x80) r10 = openat$cgroup_ro(r2, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r2, 0x3, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r3, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x13, 0x5, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xab}]}, &(0x7f0000001880)='GPL\x00', 0x3, 0x1000, &(0x7f00000018c0)=""/4096, 0x40f00, 0x11, '\x00', r7, 0x9, r8, 0x8, &(0x7f0000002c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002c40)={0x2, 0x5, 0x1, 0x50}, 0x10, 0x0, r9, 0x0, &(0x7f0000002fc0)=[r10, r11, r6, r12]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x10, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000010000000000000002000000186700000c00000000000000060000000a9b1000040000001831000005000000000000000000000018260000", @ANYRES32=r1, @ANYBLOB="00040000ff07000061730200ffffffff2089000101000000c3ebaeea000400000085200000040000009500"/64], &(0x7f0000000500)='GPL\x00', 0x6, 0x5d, &(0x7f0000000700)=""/93, 0x41000, 0x2, '\x00', r7, 0x0, r0, 0x8, &(0x7f00000005c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0x9, 0x2, 0x3b87}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff]}, 0x80) 23:31:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f00000002c0)=""/232, 0x26, 0xe8, 0x1}, 0x20) 23:31:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 23:31:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3, 0x8}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x15, 0x10001, 0x3b, 0x4, 0x382, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001700)={0xffffffffffffffff, 0x5, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x6, &(0x7f0000001240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa4f, 0x0, 0x0, 0x0, 0x514}, [@ldst={0x0, 0x1, 0x1, 0x4, 0x9, 0x8, 0xfffffffffffffff0}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000001280)='GPL\x00', 0x7, 0xb4, &(0x7f00000012c0)=""/180, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001600)={0x2, 0x6, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001740)=[r2, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5, r6, r7]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f00000013c0)={&(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000011c0)=[{&(0x7f00000001c0)="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", 0x1000}], 0x1, &(0x7f0000001400)=[@ip_retopts={{0x70, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x3c, 0x62, 0x3, 0x0, [{@dev={0xac, 0x14, 0x14, 0x29}}, {@remote, 0x101}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@empty, 0xfffffffd}, {@private=0xa010100, 0x7ff}, {@empty, 0x101}, {@loopback}]}, @rr={0x7, 0xb, 0xa2, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @rr={0x7, 0x13, 0xc, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @dev={0xac, 0x14, 0x14, 0x28}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0x9c, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x77, [@rand_addr=0x64010100]}, @timestamp={0x44, 0x24, 0xe0, 0x0, 0x7, [0x1e, 0xd02, 0x10001, 0xffff, 0x0, 0x8000, 0x2, 0x3]}, @cipso={0x86, 0x5e, 0x2, [{0x0, 0x7, "54dc0fd4cb"}, {0x1, 0x11, "af43f6405717897a96570a03240649"}, {0x6, 0x9, "2cf8a67b92915f"}, {0x5, 0x12, "ffff00"/16}, {0x7, 0xa, "ac7c1f91b3e0980f"}, {0x2, 0xf, "5ee47b4605c6643145b3eb2bde"}, {0x5, 0xc, "f21c1ef388b0db6b50b2"}]}]}}}, @ip_retopts={{0x48, 0x0, 0x7, {[@noop, @timestamp_prespec={0x44, 0xc, 0x59, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}]}, @timestamp_prespec={0x44, 0x1c, 0xdf, 0x3, 0xd, [{@multicast1}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x1}, {@broadcast, 0x1000}]}, @generic={0x82, 0x9, "9ba1ed6f0fc301"}, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_retopts={{0x10}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8001}}], 0x1e0}, 0x4) [ 755.356396][ T2714] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 755.364209][ T2714] 23:31:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x6, [@union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}, {0xb, 0x2, 0x5}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x7e, 0xe8, 0x1}, 0x20) 23:31:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 23:31:28 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/193, 0xc1, 0x0, &(0x7f00000002c0)=""/237, 0xed}}, 0x10) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r1, 0xe, 0x1, 0x9, &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) (async, rerun: 64) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) (rerun: 64) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r2, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r4, 0x0, r2, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) (async) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r5}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r6}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r2, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002bc0)=0xffffffffffffffff, 0x4) (async) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r6, r6]}, 0x80) r10 = openat$cgroup_ro(r2, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async, rerun: 32) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r2, 0x3, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (rerun: 32) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r3, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x13, 0x5, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xab}]}, &(0x7f0000001880)='GPL\x00', 0x3, 0x1000, &(0x7f00000018c0)=""/4096, 0x40f00, 0x11, '\x00', r7, 0x9, r8, 0x8, &(0x7f0000002c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002c40)={0x2, 0x5, 0x1, 0x50}, 0x10, 0x0, r9, 0x0, &(0x7f0000002fc0)=[r10, r11, r6, r12]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x10, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000010000000000000002000000186700000c00000000000000060000000a9b1000040000001831000005000000000000000000000018260000", @ANYRES32=r1, @ANYBLOB="00040000ff07000061730200ffffffff2089000101000000c3ebaeea000400000085200000040000009500"/64], &(0x7f0000000500)='GPL\x00', 0x6, 0x5d, &(0x7f0000000700)=""/93, 0x41000, 0x2, '\x00', r7, 0x0, r0, 0x8, &(0x7f00000005c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0x9, 0x2, 0x3b87}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff]}, 0x80) [ 755.408605][ T2736] FAULT_INJECTION: forcing a failure. [ 755.408605][ T2736] name failslab, interval 1, probability 0, space 0, times 0 [ 755.434828][ T2736] CPU: 0 PID: 2736 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 755.446207][ T2736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 755.456099][ T2736] Call Trace: [ 755.459224][ T2736] [ 755.462008][ T2736] dump_stack_lvl+0x151/0x1b7 [ 755.466515][ T2736] ? bfq_pos_tree_add_move+0x43e/0x43e [ 755.471811][ T2736] ? __kasan_check_write+0x14/0x20 [ 755.476753][ T2736] ? _raw_spin_lock_irq+0xa4/0x1b0 [ 755.481787][ T2736] ? _raw_spin_lock_irqsave+0x210/0x210 [ 755.487163][ T2736] dump_stack+0x15/0x17 [ 755.491159][ T2736] should_fail+0x3c0/0x510 [ 755.495410][ T2736] ? copy_net_ns+0x10a/0x5c0 [ 755.499838][ T2736] __should_failslab+0x9f/0xe0 [ 755.504438][ T2736] should_failslab+0x9/0x20 [ 755.508778][ T2736] __kmalloc+0x6d/0x350 [ 755.512769][ T2736] ? __kasan_check_write+0x14/0x20 [ 755.517718][ T2736] ? inc_ucount+0x1c4/0x2b0 [ 755.522059][ T2736] copy_net_ns+0x10a/0x5c0 [ 755.526310][ T2736] ? __kasan_check_write+0x14/0x20 [ 755.531258][ T2736] ? copy_cgroup_ns+0x92/0x4d0 [ 755.535856][ T2736] create_new_namespaces+0x3d8/0x6e0 [ 755.540977][ T2736] copy_namespaces+0x1d1/0x220 [ 755.545577][ T2736] ? copy_mm+0x119/0x1b0 [ 755.549655][ T2736] copy_process+0x12dd/0x3250 [ 755.554177][ T2736] ? proc_fail_nth_write+0x213/0x290 [ 755.559293][ T2736] ? proc_fail_nth_read+0x220/0x220 [ 755.564332][ T2736] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 755.569270][ T2736] ? vfs_write+0x9af/0x1050 [ 755.573611][ T2736] ? vmacache_update+0xb7/0x120 [ 755.578302][ T2736] kernel_clone+0x22d/0x990 [ 755.582637][ T2736] ? file_end_write+0x1b0/0x1b0 [ 755.587323][ T2736] ? __kasan_check_write+0x14/0x20 [ 755.592273][ T2736] ? create_io_thread+0x1e0/0x1e0 [ 755.597134][ T2736] ? __mutex_lock_slowpath+0x10/0x10 [ 755.602254][ T2736] __x64_sys_clone+0x289/0x310 [ 755.606854][ T2736] ? __do_sys_vfork+0x130/0x130 [ 755.611543][ T2736] ? debug_smp_processor_id+0x17/0x20 [ 755.616747][ T2736] do_syscall_64+0x44/0xd0 [ 755.621001][ T2736] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 755.626731][ T2736] RIP: 0033:0x7f14733430a9 [ 755.630988][ T2736] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 755.650515][ T2736] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:29 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 89) 23:31:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x6, [@union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}, {0xd, 0x2, 0x3}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x72, 0xe8, 0x1}, 0x20) 23:31:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 23:31:29 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) (rerun: 64) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3, 0x8}, 0xc) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x15, 0x10001, 0x3b, 0x4, 0x382, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001700)={0xffffffffffffffff, 0x5, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x6, &(0x7f0000001240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa4f, 0x0, 0x0, 0x0, 0x514}, [@ldst={0x0, 0x1, 0x1, 0x4, 0x9, 0x8, 0xfffffffffffffff0}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000001280)='GPL\x00', 0x7, 0xb4, &(0x7f00000012c0)=""/180, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001600)={0x2, 0x6, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001740)=[r2, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5, r6, r7]}, 0x80) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f00000013c0)={&(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000011c0)=[{&(0x7f00000001c0)="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", 0x1000}], 0x1, &(0x7f0000001400)=[@ip_retopts={{0x70, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x3c, 0x62, 0x3, 0x0, [{@dev={0xac, 0x14, 0x14, 0x29}}, {@remote, 0x101}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@empty, 0xfffffffd}, {@private=0xa010100, 0x7ff}, {@empty, 0x101}, {@loopback}]}, @rr={0x7, 0xb, 0xa2, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @rr={0x7, 0x13, 0xc, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @dev={0xac, 0x14, 0x14, 0x28}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0x9c, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x77, [@rand_addr=0x64010100]}, @timestamp={0x44, 0x24, 0xe0, 0x0, 0x7, [0x1e, 0xd02, 0x10001, 0xffff, 0x0, 0x8000, 0x2, 0x3]}, @cipso={0x86, 0x5e, 0x2, [{0x0, 0x7, "54dc0fd4cb"}, {0x1, 0x11, "af43f6405717897a96570a03240649"}, {0x6, 0x9, "2cf8a67b92915f"}, {0x5, 0x12, "ffff00"/16}, {0x7, 0xa, "ac7c1f91b3e0980f"}, {0x2, 0xf, "5ee47b4605c6643145b3eb2bde"}, {0x5, 0xc, "f21c1ef388b0db6b50b2"}]}]}}}, @ip_retopts={{0x48, 0x0, 0x7, {[@noop, @timestamp_prespec={0x44, 0xc, 0x59, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}]}, @timestamp_prespec={0x44, 0x1c, 0xdf, 0x3, 0xd, [{@multicast1}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x1}, {@broadcast, 0x1000}]}, @generic={0x82, 0x9, "9ba1ed6f0fc301"}, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_retopts={{0x10}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8001}}], 0x1e0}, 0x4) 23:31:29 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000040)={&(0x7f00000001c0)=""/193, 0xc1, 0x0, &(0x7f00000002c0)=""/237, 0xed}}, 0x10) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r1, 0xe, 0x1, 0x9, &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r2, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r4, 0x0, r2, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r5}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r6}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r2, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002bc0)=0xffffffffffffffff, 0x4) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r6, r6]}, 0x80) (async) r10 = openat$cgroup_ro(r2, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r2, 0x3, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r3, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x13, 0x5, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xab}]}, &(0x7f0000001880)='GPL\x00', 0x3, 0x1000, &(0x7f00000018c0)=""/4096, 0x40f00, 0x11, '\x00', r7, 0x9, r8, 0x8, &(0x7f0000002c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002c40)={0x2, 0x5, 0x1, 0x50}, 0x10, 0x0, r9, 0x0, &(0x7f0000002fc0)=[r10, r11, r6, r12]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x10, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000010000000000000002000000186700000c00000000000000060000000a9b1000040000001831000005000000000000000000000018260000", @ANYRES32=r1, @ANYBLOB="00040000ff07000061730200ffffffff2089000101000000c3ebaeea000400000085200000040000009500"/64], &(0x7f0000000500)='GPL\x00', 0x6, 0x5d, &(0x7f0000000700)=""/93, 0x41000, 0x2, '\x00', r7, 0x0, r0, 0x8, &(0x7f00000005c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0x9, 0x2, 0x3b87}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff]}, 0x80) 23:31:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}, {0x4, 0x1, 0xb50}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x66, 0xe8, 0x1}, 0x20) 23:31:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f00000002c0)=""/232, 0x26, 0xe8}, 0x20) [ 755.658757][ T2736] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 755.666568][ T2736] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 755.674378][ T2736] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 755.682190][ T2736] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 755.690000][ T2736] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 755.697817][ T2736] 23:31:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f00000002c0)=""/232, 0x26, 0xe8}, 0x20) 23:31:29 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000002c0)="2081247acdd037e2eeca877471d00646fcc1f9201e92dde90041aadfda1f7c479b1a6dfd915d646ca462c3e86d91af157a8a04e263604fa7ded62c5b80999ede628bf77e325e49cf7ae66b776b74e613beb75f15885f3ff904a5d8a8c4749dd50819d1b44dd8b4085eb1145fb99b9857f9cdc2b76d9768c9e11353849115306eae76b0e6a84679393fe71dc63a76e58ebbf5a65341e89955d3c771c18441e5f67d13e81b554794d62ece664b7f7babad2ef50e7ea30cfb72787ec8ecaca79b2cfa", &(0x7f00000003c0)=""/111, &(0x7f0000000440)="f5cad33890f6646644b6d42f10f6b22e6f21505794863f9a352c07db55a71dc1741e9e46e99d", &(0x7f0000000480)="b3a7b851931b2b51786fc34087d3384781e4ee47bac2be029ea6feca63925ae2fc81b6c6c03069619eb18f3bc3a164e82738d8084b2e95656b8a76a1646b1cd98b72708eaa282e8c0e8a53835b705be4c5233b05edec8ac46aee83b5edb9", 0x1000, r2, 0x4}, 0x38) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r3, 0x0, r0, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r0, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) r6 = openat$cgroup_ro(r0, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r0, 0x3, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, &(0x7f0000000000)=@raw=[@map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20}, @ldst={0x2, 0x1, 0x0, 0xa, 0x2, 0x8, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x200}, @initr0={0x18, 0x0, 0x0, 0x0, 0x977, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000040)='syzkaller\x00', 0x7fff, 0x0, 0x0, 0x41000, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xc, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r2, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r1}, 0x8) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000740)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000780)='GPL\x00', 0x9, 0xac, &(0x7f00000007c0)=""/172, 0x40e00, 0x8, '\x00', 0x0, 0x1b, r5, 0x8, &(0x7f0000000880)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000008c0)={0x8, 0xd, 0x40, 0x6}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)=[r2, r5]}, 0x80) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1a, 0x2, 0x245, 0x8f7, 0x1000, r7, 0x20, '\x00', r3, r2, 0x3, 0x5}, 0x48) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r12}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r13}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r13, r13]}, 0x80) write$cgroup_pressure(r13, &(0x7f0000000b00)={'full', 0x20, 0x5, 0x20, 0x8}, 0x2f) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000540)=@raw=[@ldst={0x1, 0x3, 0x3, 0xa, 0xa, 0xfffffffffffffff4}, @ldst={0x3, 0x1, 0x1, 0x6, 0x0, 0xfffffffffffffff8}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000580)='GPL\x00', 0x1000, 0x1000, &(0x7f0000001840)=""/4096, 0x40f00, 0x3, '\x00', r8, 0x17, r9, 0x8, &(0x7f00000006c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0xc, 0x9, 0x8}, 0x10, 0x1f820, r10, 0x0, &(0x7f0000000a40)=[r0, r7, r11, r0, r5, r5, r6]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}, {0x1, 0x4, 0x9}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x5a, 0xe8, 0x1}, 0x20) [ 755.751110][ T2772] FAULT_INJECTION: forcing a failure. [ 755.751110][ T2772] name failslab, interval 1, probability 0, space 0, times 0 [ 755.781983][ T2772] CPU: 1 PID: 2772 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 755.793510][ T2772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 755.803494][ T2772] Call Trace: [ 755.806617][ T2772] [ 755.809392][ T2772] dump_stack_lvl+0x151/0x1b7 [ 755.813905][ T2772] ? bfq_pos_tree_add_move+0x43e/0x43e [ 755.819201][ T2772] ? ida_alloc_range+0xa08/0xa70 [ 755.823973][ T2772] dump_stack+0x15/0x17 [ 755.827964][ T2772] should_fail+0x3c0/0x510 [ 755.832218][ T2772] __should_failslab+0x9f/0xe0 [ 755.836816][ T2772] should_failslab+0x9/0x20 [ 755.841154][ T2772] kmem_cache_alloc+0x4f/0x2f0 [ 755.845766][ T2772] ? proc_net_ns_init+0x52/0x3a0 [ 755.850616][ T2772] proc_net_ns_init+0x52/0x3a0 [ 755.855215][ T2772] ops_init+0x1bf/0x4a0 [ 755.859209][ T2772] setup_net+0x34b/0xbb0 [ 755.863287][ T2772] ? __kasan_check_write+0x14/0x20 [ 755.868234][ T2772] ? copy_net_ns+0x5c0/0x5c0 [ 755.872659][ T2772] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 755.878041][ T2772] ? copy_net_ns+0x18a/0x5c0 [ 755.882470][ T2772] copy_net_ns+0x359/0x5c0 [ 755.886722][ T2772] create_new_namespaces+0x3d8/0x6e0 [ 755.891846][ T2772] copy_namespaces+0x1d1/0x220 [ 755.896440][ T2772] ? copy_mm+0x119/0x1b0 [ 755.900520][ T2772] copy_process+0x12dd/0x3250 [ 755.905036][ T2772] ? proc_fail_nth_write+0x213/0x290 [ 755.910168][ T2772] ? proc_fail_nth_read+0x220/0x220 [ 755.915198][ T2772] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 755.920144][ T2772] ? vfs_write+0x9af/0x1050 [ 755.924480][ T2772] ? vmacache_update+0xb7/0x120 [ 755.929251][ T2772] kernel_clone+0x22d/0x990 [ 755.933597][ T2772] ? file_end_write+0x1b0/0x1b0 [ 755.938287][ T2772] ? __kasan_check_write+0x14/0x20 [ 755.943223][ T2772] ? create_io_thread+0x1e0/0x1e0 [ 755.948086][ T2772] ? __mutex_lock_slowpath+0x10/0x10 [ 755.953205][ T2772] __x64_sys_clone+0x289/0x310 [ 755.957809][ T2772] ? __do_sys_vfork+0x130/0x130 [ 755.962495][ T2772] ? debug_smp_processor_id+0x17/0x20 [ 755.967700][ T2772] do_syscall_64+0x44/0xd0 [ 755.971953][ T2772] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 755.977683][ T2772] RIP: 0033:0x7f14733430a9 [ 755.981937][ T2772] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 756.001374][ T2772] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 756.009627][ T2772] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 756.017440][ T2772] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 756.025255][ T2772] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 756.033054][ T2772] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 756.040866][ T2772] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 756.048682][ T2772] 23:31:29 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 90) 23:31:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f00000002c0)=""/232, 0x26, 0xe8}, 0x20) 23:31:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}, {0x2, 0x5, 0x8300}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x4e, 0xe8, 0x1}, 0x20) 23:31:29 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000002c0)="2081247acdd037e2eeca877471d00646fcc1f9201e92dde90041aadfda1f7c479b1a6dfd915d646ca462c3e86d91af157a8a04e263604fa7ded62c5b80999ede628bf77e325e49cf7ae66b776b74e613beb75f15885f3ff904a5d8a8c4749dd50819d1b44dd8b4085eb1145fb99b9857f9cdc2b76d9768c9e11353849115306eae76b0e6a84679393fe71dc63a76e58ebbf5a65341e89955d3c771c18441e5f67d13e81b554794d62ece664b7f7babad2ef50e7ea30cfb72787ec8ecaca79b2cfa", &(0x7f00000003c0)=""/111, &(0x7f0000000440)="f5cad33890f6646644b6d42f10f6b22e6f21505794863f9a352c07db55a71dc1741e9e46e99d", &(0x7f0000000480)="b3a7b851931b2b51786fc34087d3384781e4ee47bac2be029ea6feca63925ae2fc81b6c6c03069619eb18f3bc3a164e82738d8084b2e95656b8a76a1646b1cd98b72708eaa282e8c0e8a53835b705be4c5233b05edec8ac46aee83b5edb9", 0x1000, r2, 0x4}, 0x38) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r3, 0x0, r0, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) (async) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r0, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) (async) r6 = openat$cgroup_ro(r0, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r0, 0x3, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, &(0x7f0000000000)=@raw=[@map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20}, @ldst={0x2, 0x1, 0x0, 0xa, 0x2, 0x8, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x200}, @initr0={0x18, 0x0, 0x0, 0x0, 0x977, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000040)='syzkaller\x00', 0x7fff, 0x0, 0x0, 0x41000, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xc, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r2, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r1}, 0x8) (async) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000740)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000780)='GPL\x00', 0x9, 0xac, &(0x7f00000007c0)=""/172, 0x40e00, 0x8, '\x00', 0x0, 0x1b, r5, 0x8, &(0x7f0000000880)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000008c0)={0x8, 0xd, 0x40, 0x6}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)=[r2, r5]}, 0x80) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1a, 0x2, 0x245, 0x8f7, 0x1000, r7, 0x20, '\x00', r3, r2, 0x3, 0x5}, 0x48) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r12}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r13}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r13, r13]}, 0x80) write$cgroup_pressure(r13, &(0x7f0000000b00)={'full', 0x20, 0x5, 0x20, 0x8}, 0x2f) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000540)=@raw=[@ldst={0x1, 0x3, 0x3, 0xa, 0xa, 0xfffffffffffffff4}, @ldst={0x3, 0x1, 0x1, 0x6, 0x0, 0xfffffffffffffff8}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000580)='GPL\x00', 0x1000, 0x1000, &(0x7f0000001840)=""/4096, 0x40f00, 0x3, '\x00', r8, 0x17, r9, 0x8, &(0x7f00000006c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0xc, 0x9, 0x8}, 0x10, 0x1f820, r10, 0x0, &(0x7f0000000a40)=[r0, r7, r11, r0, r5, r5, r6]}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:29 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async, rerun: 64) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (rerun: 64) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) (rerun: 64) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3, 0x8}, 0xc) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x15, 0x10001, 0x3b, 0x4, 0x382, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001700)={0xffffffffffffffff, 0x5, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x6, &(0x7f0000001240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa4f, 0x0, 0x0, 0x0, 0x514}, [@ldst={0x0, 0x1, 0x1, 0x4, 0x9, 0x8, 0xfffffffffffffff0}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000001280)='GPL\x00', 0x7, 0xb4, &(0x7f00000012c0)=""/180, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001600)={0x2, 0x6, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001740)=[r2, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5, r6, r7]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f00000013c0)={&(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000011c0)=[{&(0x7f00000001c0)="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", 0x1000}], 0x1, &(0x7f0000001400)=[@ip_retopts={{0x70, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x3c, 0x62, 0x3, 0x0, [{@dev={0xac, 0x14, 0x14, 0x29}}, {@remote, 0x101}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@empty, 0xfffffffd}, {@private=0xa010100, 0x7ff}, {@empty, 0x101}, {@loopback}]}, @rr={0x7, 0xb, 0xa2, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @rr={0x7, 0x13, 0xc, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @dev={0xac, 0x14, 0x14, 0x28}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0x9c, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x77, [@rand_addr=0x64010100]}, @timestamp={0x44, 0x24, 0xe0, 0x0, 0x7, [0x1e, 0xd02, 0x10001, 0xffff, 0x0, 0x8000, 0x2, 0x3]}, @cipso={0x86, 0x5e, 0x2, [{0x0, 0x7, "54dc0fd4cb"}, {0x1, 0x11, "af43f6405717897a96570a03240649"}, {0x6, 0x9, "2cf8a67b92915f"}, {0x5, 0x12, "ffff00"/16}, {0x7, 0xa, "ac7c1f91b3e0980f"}, {0x2, 0xf, "5ee47b4605c6643145b3eb2bde"}, {0x5, 0xc, "f21c1ef388b0db6b50b2"}]}]}}}, @ip_retopts={{0x48, 0x0, 0x7, {[@noop, @timestamp_prespec={0x44, 0xc, 0x59, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}]}, @timestamp_prespec={0x44, 0x1c, 0xdf, 0x3, 0xd, [{@multicast1}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x1}, {@broadcast, 0x1000}]}, @generic={0x82, 0x9, "9ba1ed6f0fc301"}, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_retopts={{0x10}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8001}}], 0x1e0}, 0x4) 23:31:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}, {0x3, 0x5, 0x800}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x42, 0xe8, 0x1}, 0x20) 23:31:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3, 0x8}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x15, 0x10001, 0x3b, 0x4, 0x382, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001700)={0xffffffffffffffff, 0x5, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x6, &(0x7f0000001240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa4f, 0x0, 0x0, 0x0, 0x514}, [@ldst={0x0, 0x1, 0x1, 0x4, 0x9, 0x8, 0xfffffffffffffff0}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000001280)='GPL\x00', 0x7, 0xb4, &(0x7f00000012c0)=""/180, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001600)={0x2, 0x6, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001740)=[r2, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5, r6, r7]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f00000013c0)={&(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000011c0)=[{&(0x7f00000001c0)="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", 0x1000}], 0x1, &(0x7f0000001400)=[@ip_retopts={{0x70, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x3c, 0x62, 0x3, 0x0, [{@dev={0xac, 0x14, 0x14, 0x29}}, {@remote, 0x101}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@empty, 0xfffffffd}, {@private=0xa010100, 0x7ff}, {@empty, 0x101}, {@loopback}]}, @rr={0x7, 0xb, 0xa2, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @rr={0x7, 0x13, 0xc, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @dev={0xac, 0x14, 0x14, 0x28}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0x9c, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x77, [@rand_addr=0x64010100]}, @timestamp={0x44, 0x24, 0xe0, 0x0, 0x7, [0x1e, 0xd02, 0x10001, 0xffff, 0x0, 0x8000, 0x2, 0x3]}, @cipso={0x86, 0x5e, 0x2, [{0x0, 0x7, "54dc0fd4cb"}, {0x1, 0x11, "af43f6405717897a96570a03240649"}, {0x6, 0x9, "2cf8a67b92915f"}, {0x5, 0x12, "ffff00"/16}, {0x7, 0xa, "ac7c1f91b3e0980f"}, {0x2, 0xf, "5ee47b4605c6643145b3eb2bde"}, {0x5, 0xc, "f21c1ef388b0db6b50b2"}]}]}}}, @ip_retopts={{0x48, 0x0, 0x7, {[@noop, @timestamp_prespec={0x44, 0xc, 0x59, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}]}, @timestamp_prespec={0x44, 0x1c, 0xdf, 0x3, 0xd, [{@multicast1}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x1}, {@broadcast, 0x1000}]}, @generic={0x82, 0x9, "9ba1ed6f0fc301"}, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_retopts={{0x10}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8001}}], 0x1e0}, 0x4) 23:31:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x3, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:29 executing program 5: ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="8181010018469b7b1de936a0505ba9903202c18d0ef6b1338a67cfe7163eaf4fab975e22e5a18ec258db570ac925cbc9eee0002b577d893dc0b35bfcca83ef40771edc08ac815db9ed402d62f1732d652a337b668af2e4a8ff711ac4bf1cb677cb2a9732bc40a0eee6c84e86f33410e313b3248eb7118335da686ab48c09aed212378612f6083905884cedd1058ab3aaf6aad0296973635e804868d5cfca8b6f668861c450f5baa9a2c8b88c58d1"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:29 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f00000002c0)="2081247acdd037e2eeca877471d00646fcc1f9201e92dde90041aadfda1f7c479b1a6dfd915d646ca462c3e86d91af157a8a04e263604fa7ded62c5b80999ede628bf77e325e49cf7ae66b776b74e613beb75f15885f3ff904a5d8a8c4749dd50819d1b44dd8b4085eb1145fb99b9857f9cdc2b76d9768c9e11353849115306eae76b0e6a84679393fe71dc63a76e58ebbf5a65341e89955d3c771c18441e5f67d13e81b554794d62ece664b7f7babad2ef50e7ea30cfb72787ec8ecaca79b2cfa", &(0x7f00000003c0)=""/111, &(0x7f0000000440)="f5cad33890f6646644b6d42f10f6b22e6f21505794863f9a352c07db55a71dc1741e9e46e99d", &(0x7f0000000480)="b3a7b851931b2b51786fc34087d3384781e4ee47bac2be029ea6feca63925ae2fc81b6c6c03069619eb18f3bc3a164e82738d8084b2e95656b8a76a1646b1cd98b72708eaa282e8c0e8a53835b705be4c5233b05edec8ac46aee83b5edb9", 0x1000, r2, 0x4}, 0x38) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r3, 0x0, r0, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) (async) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r5}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r0, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r5, r5]}, 0x80) r6 = openat$cgroup_ro(r0, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r0, 0x3, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, &(0x7f0000000000)=@raw=[@map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20}, @ldst={0x2, 0x1, 0x0, 0xa, 0x2, 0x8, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x200}, @initr0={0x18, 0x0, 0x0, 0x0, 0x977, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000040)='syzkaller\x00', 0x7fff, 0x0, 0x0, 0x41000, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xc, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r2, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r1}, 0x8) (async) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000740)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000780)='GPL\x00', 0x9, 0xac, &(0x7f00000007c0)=""/172, 0x40e00, 0x8, '\x00', 0x0, 0x1b, r5, 0x8, &(0x7f0000000880)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000008c0)={0x8, 0xd, 0x40, 0x6}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)=[r2, r5]}, 0x80) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1a, 0x2, 0x245, 0x8f7, 0x1000, r7, 0x20, '\x00', r3, r2, 0x3, 0x5}, 0x48) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r12}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r13}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r13, r13]}, 0x80) (async) write$cgroup_pressure(r13, &(0x7f0000000b00)={'full', 0x20, 0x5, 0x20, 0x8}, 0x2f) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000540)=@raw=[@ldst={0x1, 0x3, 0x3, 0xa, 0xa, 0xfffffffffffffff4}, @ldst={0x3, 0x1, 0x1, 0x6, 0x0, 0xfffffffffffffff8}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000580)='GPL\x00', 0x1000, 0x1000, &(0x7f0000001840)=""/4096, 0x40f00, 0x3, '\x00', r8, 0x17, r9, 0x8, &(0x7f00000006c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0xc, 0x9, 0x8}, 0x10, 0x1f820, r10, 0x0, &(0x7f0000000a40)=[r0, r7, r11, r0, r5, r5, r6]}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 756.145491][ T2802] FAULT_INJECTION: forcing a failure. [ 756.145491][ T2802] name failslab, interval 1, probability 0, space 0, times 0 [ 756.177549][ T2802] CPU: 0 PID: 2802 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 756.188923][ T2802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 756.198815][ T2802] Call Trace: [ 756.201939][ T2802] [ 756.204718][ T2802] dump_stack_lvl+0x151/0x1b7 [ 756.209228][ T2802] ? bfq_pos_tree_add_move+0x43e/0x43e [ 756.214529][ T2802] dump_stack+0x15/0x17 [ 756.218514][ T2802] should_fail+0x3c0/0x510 [ 756.222770][ T2802] __should_failslab+0x9f/0xe0 [ 756.227370][ T2802] should_failslab+0x9/0x20 [ 756.231710][ T2802] kmem_cache_alloc+0x4f/0x2f0 [ 756.236306][ T2802] ? anon_vma_clone+0xa1/0x4f0 [ 756.240910][ T2802] anon_vma_clone+0xa1/0x4f0 [ 756.245339][ T2802] anon_vma_fork+0x91/0x4f0 [ 756.249673][ T2802] ? anon_vma_name+0x4c/0x70 [ 756.254101][ T2802] dup_mmap+0x750/0xea0 [ 756.258097][ T2802] ? __delayed_free_task+0x20/0x20 [ 756.263040][ T2802] ? mm_init+0x807/0x960 [ 756.267120][ T2802] dup_mm+0x91/0x330 [ 756.270854][ T2802] copy_mm+0x108/0x1b0 [ 756.274760][ T2802] copy_process+0x1295/0x3250 [ 756.279274][ T2802] ? proc_fail_nth_write+0x213/0x290 [ 756.284395][ T2802] ? proc_fail_nth_read+0x220/0x220 [ 756.289427][ T2802] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 756.294373][ T2802] ? vfs_write+0x9af/0x1050 [ 756.298711][ T2802] ? vmacache_update+0xb7/0x120 [ 756.303401][ T2802] kernel_clone+0x22d/0x990 [ 756.307739][ T2802] ? file_end_write+0x1b0/0x1b0 [ 756.312427][ T2802] ? __kasan_check_write+0x14/0x20 [ 756.317374][ T2802] ? create_io_thread+0x1e0/0x1e0 [ 756.322233][ T2802] ? __mutex_lock_slowpath+0x10/0x10 [ 756.327354][ T2802] __x64_sys_clone+0x289/0x310 [ 756.331957][ T2802] ? __do_sys_vfork+0x130/0x130 [ 756.336644][ T2802] ? debug_smp_processor_id+0x17/0x20 [ 756.341849][ T2802] do_syscall_64+0x44/0xd0 [ 756.346104][ T2802] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 756.351829][ T2802] RIP: 0033:0x7f14733430a9 [ 756.356085][ T2802] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 756.375525][ T2802] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 756.383768][ T2802] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 23:31:29 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 91) 23:31:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3, 0x8}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x15, 0x10001, 0x3b, 0x4, 0x382, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001700)={0xffffffffffffffff, 0x5, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x6, &(0x7f0000001240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa4f, 0x0, 0x0, 0x0, 0x514}, [@ldst={0x0, 0x1, 0x1, 0x4, 0x9, 0x8, 0xfffffffffffffff0}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000001280)='GPL\x00', 0x7, 0xb4, &(0x7f00000012c0)=""/180, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001600)={0x2, 0x6, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001740)=[r2, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5, r6, r7]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f00000013c0)={&(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000011c0)=[{&(0x7f00000001c0)="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", 0x1000}], 0x1, &(0x7f0000001400)=[@ip_retopts={{0x70, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x3c, 0x62, 0x3, 0x0, [{@dev={0xac, 0x14, 0x14, 0x29}}, {@remote, 0x101}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@empty, 0xfffffffd}, {@private=0xa010100, 0x7ff}, {@empty, 0x101}, {@loopback}]}, @rr={0x7, 0xb, 0xa2, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @rr={0x7, 0x13, 0xc, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @dev={0xac, 0x14, 0x14, 0x28}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0x9c, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x77, [@rand_addr=0x64010100]}, @timestamp={0x44, 0x24, 0xe0, 0x0, 0x7, [0x1e, 0xd02, 0x10001, 0xffff, 0x0, 0x8000, 0x2, 0x3]}, @cipso={0x86, 0x5e, 0x2, [{0x0, 0x7, "54dc0fd4cb"}, {0x1, 0x11, "af43f6405717897a96570a03240649"}, {0x6, 0x9, "2cf8a67b92915f"}, {0x5, 0x12, "ffff00"/16}, {0x7, 0xa, "ac7c1f91b3e0980f"}, {0x2, 0xf, "5ee47b4605c6643145b3eb2bde"}, {0x5, 0xc, "f21c1ef388b0db6b50b2"}]}]}}}, @ip_retopts={{0x48, 0x0, 0x7, {[@noop, @timestamp_prespec={0x44, 0xc, 0x59, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}]}, @timestamp_prespec={0x44, 0x1c, 0xdf, 0x3, 0xd, [{@multicast1}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x1}, {@broadcast, 0x1000}]}, @generic={0x82, 0x9, "9ba1ed6f0fc301"}, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_retopts={{0x10}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8001}}], 0x1e0}, 0x4) 23:31:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:29 executing program 5: ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="8181010018469b7b1de936a0505ba9903202c18d0ef6b1338a67cfe7163eaf4fab975e22e5a18ec258db570ac925cbc9eee0002b577d893dc0b35bfcca83ef40771edc08ac815db9ed402d62f1732d652a337b668af2e4a8ff711ac4bf1cb677cb2a9732bc40a0eee6c84e86f33410e313b3248eb7118335da686ab48c09aed212378612f6083905884cedd1058ab3aaf6aad0296973635e804868d5cfca8b6f668861c450f5baa9a2c8b88c58d1"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="8181010018469b7b1de936a0505ba9903202c18d0ef6b1338a67cfe7163eaf4fab975e22e5a18ec258db570ac925cbc9eee0002b577d893dc0b35bfcca83ef40771edc08ac815db9ed402d62f1732d652a337b668af2e4a8ff711ac4bf1cb677cb2a9732bc40a0eee6c84e86f33410e313b3248eb7118335da686ab48c09aed212378612f6083905884cedd1058ab3aaf6aad0296973635e804868d5cfca8b6f668861c450f5baa9a2c8b88c58d1"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) 23:31:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x2a, 0xe8, 0x1}, 0x20) 23:31:29 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0xd, 0x1, 0x100, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 23:31:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x2a, 0xe8, 0x1}, 0x20) [ 756.391581][ T2802] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 756.399392][ T2802] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 756.407203][ T2802] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 756.415018][ T2802] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 756.422834][ T2802] 23:31:29 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0xd, 0x1, 0x100, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 23:31:29 executing program 5: ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="8181010018469b7b1de936a0505ba9903202c18d0ef6b1338a67cfe7163eaf4fab975e22e5a18ec258db570ac925cbc9eee0002b577d893dc0b35bfcca83ef40771edc08ac815db9ed402d62f1732d652a337b668af2e4a8ff711ac4bf1cb677cb2a9732bc40a0eee6c84e86f33410e313b3248eb7118335da686ab48c09aed212378612f6083905884cedd1058ab3aaf6aad0296973635e804868d5cfca8b6f668861c450f5baa9a2c8b88c58d1"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3, 0x8}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x15, 0x10001, 0x3b, 0x4, 0x382, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001700)={0xffffffffffffffff, 0x5, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x6, &(0x7f0000001240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa4f, 0x0, 0x0, 0x0, 0x514}, [@ldst={0x0, 0x1, 0x1, 0x4, 0x9, 0x8, 0xfffffffffffffff0}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000001280)='GPL\x00', 0x7, 0xb4, &(0x7f00000012c0)=""/180, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001600)={0x2, 0x6, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001740)=[r2, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5, r6, r7]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f00000013c0)={&(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000011c0)=[{&(0x7f00000001c0)="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", 0x1000}], 0x1, &(0x7f0000001400)=[@ip_retopts={{0x70, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x3c, 0x62, 0x3, 0x0, [{@dev={0xac, 0x14, 0x14, 0x29}}, {@remote, 0x101}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@empty, 0xfffffffd}, {@private=0xa010100, 0x7ff}, {@empty, 0x101}, {@loopback}]}, @rr={0x7, 0xb, 0xa2, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @rr={0x7, 0x13, 0xc, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @dev={0xac, 0x14, 0x14, 0x28}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0x9c, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x77, [@rand_addr=0x64010100]}, @timestamp={0x44, 0x24, 0xe0, 0x0, 0x7, [0x1e, 0xd02, 0x10001, 0xffff, 0x0, 0x8000, 0x2, 0x3]}, @cipso={0x86, 0x5e, 0x2, [{0x0, 0x7, "54dc0fd4cb"}, {0x1, 0x11, "af43f6405717897a96570a03240649"}, {0x6, 0x9, "2cf8a67b92915f"}, {0x5, 0x12, "ffff00"/16}, {0x7, 0xa, "ac7c1f91b3e0980f"}, {0x2, 0xf, "5ee47b4605c6643145b3eb2bde"}, {0x5, 0xc, "f21c1ef388b0db6b50b2"}]}]}}}, @ip_retopts={{0x48, 0x0, 0x7, {[@noop, @timestamp_prespec={0x44, 0xc, 0x59, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}]}, @timestamp_prespec={0x44, 0x1c, 0xdf, 0x3, 0xd, [{@multicast1}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x1}, {@broadcast, 0x1000}]}, @generic={0x82, 0x9, "9ba1ed6f0fc301"}, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_retopts={{0x10}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8001}}], 0x1e0}, 0x4) 23:31:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="ca2ab9e1b7800c194ee6b3b432f40250f1fd9bc36977a71851783f9b3ca3ea77c64c41cf9fafaa1453e1888a0b69e41d8bc0612e4ad554c7bec6c429dd4bf83a0934b0f5a7b47165f6abee52dfae2844f0ef5593a2956f1368"], &(0x7f00000001c0)=""/131, 0x5c, 0x83, 0x1}, 0x20) [ 756.496780][ T2835] FAULT_INJECTION: forcing a failure. [ 756.496780][ T2835] name failslab, interval 1, probability 0, space 0, times 0 [ 756.516781][ T2835] CPU: 0 PID: 2835 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 756.528150][ T2835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 756.538045][ T2835] Call Trace: [ 756.541165][ T2835] [ 756.543944][ T2835] dump_stack_lvl+0x151/0x1b7 [ 756.548456][ T2835] ? bfq_pos_tree_add_move+0x43e/0x43e [ 756.553749][ T2835] ? xas_nomem+0x19e/0x1e0 [ 756.558003][ T2835] ? ida_alloc_range+0xa08/0xa70 [ 756.562775][ T2835] dump_stack+0x15/0x17 [ 756.566769][ T2835] should_fail+0x3c0/0x510 [ 756.571022][ T2835] __should_failslab+0x9f/0xe0 [ 756.575620][ T2835] should_failslab+0x9/0x20 [ 756.579960][ T2835] kmem_cache_alloc+0x4f/0x2f0 [ 756.584559][ T2835] ? __proc_create+0x611/0xbb0 [ 756.589160][ T2835] __proc_create+0x611/0xbb0 [ 756.593587][ T2835] ? proc_symlink+0x290/0x290 [ 756.598102][ T2835] _proc_mkdir+0xd3/0x200 [ 756.602268][ T2835] ? __proc_create+0xbb0/0xbb0 [ 756.606883][ T2835] ? kmem_cache_alloc+0x1c1/0x2f0 [ 756.611727][ T2835] ? sysctl_net_exit+0x20/0x20 [ 756.616326][ T2835] ? memset+0x35/0x40 [ 756.620147][ T2835] netfilter_net_init+0x236/0x2a0 [ 756.625007][ T2835] ops_init+0x1bf/0x4a0 [ 756.629005][ T2835] setup_net+0x34b/0xbb0 [ 756.633077][ T2835] ? __kasan_check_write+0x14/0x20 [ 756.638025][ T2835] ? copy_net_ns+0x5c0/0x5c0 [ 756.642454][ T2835] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 756.647834][ T2835] ? copy_net_ns+0x18a/0x5c0 [ 756.652266][ T2835] copy_net_ns+0x359/0x5c0 [ 756.656511][ T2835] create_new_namespaces+0x3d8/0x6e0 [ 756.661635][ T2835] copy_namespaces+0x1d1/0x220 [ 756.666235][ T2835] ? copy_mm+0x119/0x1b0 [ 756.670312][ T2835] copy_process+0x12dd/0x3250 [ 756.674829][ T2835] ? proc_fail_nth_write+0x213/0x290 [ 756.679950][ T2835] ? proc_fail_nth_read+0x220/0x220 [ 756.684986][ T2835] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 756.689932][ T2835] ? vfs_write+0x9af/0x1050 [ 756.694266][ T2835] ? vmacache_update+0xb7/0x120 [ 756.698961][ T2835] kernel_clone+0x22d/0x990 [ 756.703294][ T2835] ? file_end_write+0x1b0/0x1b0 [ 756.707981][ T2835] ? __kasan_check_write+0x14/0x20 [ 756.712928][ T2835] ? create_io_thread+0x1e0/0x1e0 [ 756.717788][ T2835] ? __mutex_lock_slowpath+0x10/0x10 [ 756.722910][ T2835] __x64_sys_clone+0x289/0x310 [ 756.727511][ T2835] ? __do_sys_vfork+0x130/0x130 [ 756.732197][ T2835] ? debug_smp_processor_id+0x17/0x20 [ 756.737403][ T2835] do_syscall_64+0x44/0xd0 [ 756.741662][ T2835] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 756.747385][ T2835] RIP: 0033:0x7f14733430a9 [ 756.751726][ T2835] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 756.771167][ T2835] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 756.779416][ T2835] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 756.787221][ T2835] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 23:31:30 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 92) 23:31:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x2a, 0xe8, 0x1}, 0x20) 23:31:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="ca2ab9e1b7800c194ee6b3b432f40250f1fd9bc36977a71851783f9b3ca3ea77c64c41cf9fafaa1453e1888a0b69e41d8bc0612e4ad554c7bec6c429dd4bf83a0934b0f5a7b47165f6abee52dfae2844f0ef5593a2956f1368"], &(0x7f00000001c0)=""/131, 0x5c, 0x83, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="ca2ab9e1b7800c194ee6b3b432f40250f1fd9bc36977a71851783f9b3ca3ea77c64c41cf9fafaa1453e1888a0b69e41d8bc0612e4ad554c7bec6c429dd4bf83a0934b0f5a7b47165f6abee52dfae2844f0ef5593a2956f1368"], &(0x7f00000001c0)=""/131, 0x5c, 0x83, 0x1}, 0x20) (async) 23:31:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3, 0x8}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x15, 0x10001, 0x3b, 0x4, 0x382, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001700)={0xffffffffffffffff, 0x5, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x6, &(0x7f0000001240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa4f, 0x0, 0x0, 0x0, 0x514}, [@ldst={0x0, 0x1, 0x1, 0x4, 0x9, 0x8, 0xfffffffffffffff0}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000001280)='GPL\x00', 0x7, 0xb4, &(0x7f00000012c0)=""/180, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001600)={0x2, 0x6, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001740)=[r2, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5, r6, r7]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) 23:31:30 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0xd, 0x1, 0x100, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 23:31:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000001000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 756.795037][ T2835] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 756.802849][ T2835] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 756.810658][ T2835] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 756.818470][ T2835] 23:31:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="ca2ab9e1b7800c194ee6b3b432f40250f1fd9bc36977a71851783f9b3ca3ea77c64c41cf9fafaa1453e1888a0b69e41d8bc0612e4ad554c7bec6c429dd4bf83a0934b0f5a7b47165f6abee52dfae2844f0ef5593a2956f1368"], &(0x7f00000001c0)=""/131, 0x5c, 0x83, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="ca2ab9e1b7800c194ee6b3b432f40250f1fd9bc36977a71851783f9b3ca3ea77c64c41cf9fafaa1453e1888a0b69e41d8bc0612e4ad554c7bec6c429dd4bf83a0934b0f5a7b47165f6abee52dfae2844f0ef5593a2956f1368"], &(0x7f00000001c0)=""/131, 0x5c, 0x83, 0x1}, 0x20) (async) 23:31:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3, 0x8}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x15, 0x10001, 0x3b, 0x4, 0x382, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001700)={0xffffffffffffffff, 0x5, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x6, &(0x7f0000001240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa4f, 0x0, 0x0, 0x0, 0x514}, [@ldst={0x0, 0x1, 0x1, 0x4, 0x9, 0x8, 0xfffffffffffffff0}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000001280)='GPL\x00', 0x7, 0xb4, &(0x7f00000012c0)=""/180, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001600)={0x2, 0x6, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001740)=[r2, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5, r6, r7]}, 0x80) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) 23:31:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r0, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000002900), &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002bc0)=0xffffffffffffffff, 0x4) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r8 = openat$cgroup_ro(r0, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r0, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r1, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x13, 0x5, &(0x7f0000001840)=ANY=[@ANYBLOB="180000000800000000000000ab0000ff0f00000000000002"], &(0x7f0000001880)='GPL\x00', 0x3, 0x1000, &(0x7f00000018c0)=""/4096, 0x40f00, 0x11, '\x00', r5, 0x9, r6, 0x8, &(0x7f0000002c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002c40)={0x2, 0x5, 0x1, 0x50}, 0x10, 0x0, r7, 0x0, &(0x7f0000002fc0)=[r8, r9, r4, r10]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xff}, @jmp={0x5, 0x1, 0x8, 0x0, 0xa, 0x18, 0xffffffffffffffff}], &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x41000, 0x1c, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0xa, 0x10000000, 0x10000}, 0x10}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000000078000000780000000400000001000000050000040400000000000000030000000100000005000000010000006bfeffff0200000005000000010000000000000001000000ff0700000800000004000000000000000000000000000003000000000500000005000000090000001000000000070008050000000e0000000000000700000000002e3000"], &(0x7f0000000280)=""/237, 0x94, 0xed, 0x1}, 0x20) [ 756.822466][ T2835] cannot create netfilter proc entry [ 756.878906][ T2861] FAULT_INJECTION: forcing a failure. [ 756.878906][ T2861] name failslab, interval 1, probability 0, space 0, times 0 [ 756.907433][ T2861] CPU: 1 PID: 2861 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 756.918810][ T2861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 756.928708][ T2861] Call Trace: [ 756.931949][ T2861] [ 756.934708][ T2861] dump_stack_lvl+0x151/0x1b7 [ 756.939212][ T2861] ? bfq_pos_tree_add_move+0x43e/0x43e [ 756.944505][ T2861] dump_stack+0x15/0x17 [ 756.948498][ T2861] should_fail+0x3c0/0x510 [ 756.952743][ T2861] __should_failslab+0x9f/0xe0 [ 756.957344][ T2861] should_failslab+0x9/0x20 [ 756.961681][ T2861] kmem_cache_alloc+0x4f/0x2f0 [ 756.966283][ T2861] ? anon_vma_fork+0x1b9/0x4f0 [ 756.970887][ T2861] anon_vma_fork+0x1b9/0x4f0 [ 756.975309][ T2861] dup_mmap+0x750/0xea0 [ 756.979306][ T2861] ? __delayed_free_task+0x20/0x20 [ 756.984247][ T2861] ? mm_init+0x807/0x960 [ 756.988333][ T2861] dup_mm+0x91/0x330 [ 756.992065][ T2861] copy_mm+0x108/0x1b0 [ 756.995966][ T2861] copy_process+0x1295/0x3250 [ 757.000477][ T2861] ? proc_fail_nth_write+0x213/0x290 [ 757.005599][ T2861] ? proc_fail_nth_read+0x220/0x220 [ 757.010632][ T2861] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 757.015578][ T2861] ? vfs_write+0x9af/0x1050 [ 757.019919][ T2861] ? vmacache_update+0xb7/0x120 [ 757.024607][ T2861] kernel_clone+0x22d/0x990 [ 757.028945][ T2861] ? file_end_write+0x1b0/0x1b0 [ 757.033633][ T2861] ? __kasan_check_write+0x14/0x20 [ 757.038580][ T2861] ? create_io_thread+0x1e0/0x1e0 [ 757.043440][ T2861] ? __mutex_lock_slowpath+0x10/0x10 [ 757.048563][ T2861] __x64_sys_clone+0x289/0x310 [ 757.053161][ T2861] ? __do_sys_vfork+0x130/0x130 [ 757.057852][ T2861] ? debug_smp_processor_id+0x17/0x20 [ 757.063063][ T2861] do_syscall_64+0x44/0xd0 [ 757.067307][ T2861] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 757.073036][ T2861] RIP: 0033:0x7f14733430a9 [ 757.077291][ T2861] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 757.096735][ T2861] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 757.104979][ T2861] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 757.112789][ T2861] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 757.120597][ T2861] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:30 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 93) 23:31:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='blkio.bfq.io_queued\x00', 0x0, 0x0) 23:31:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x15, 0x10001, 0x3b, 0x4, 0x382, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001700)={0xffffffffffffffff, 0x5, 0x10}, 0xc) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) 23:31:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r0, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000002900), &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002bc0)=0xffffffffffffffff, 0x4) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r8 = openat$cgroup_ro(r0, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r0, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r1, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x13, 0x5, &(0x7f0000001840)=ANY=[@ANYBLOB="180000000800000000000000ab0000ff0f00000000000002"], &(0x7f0000001880)='GPL\x00', 0x3, 0x1000, &(0x7f00000018c0)=""/4096, 0x40f00, 0x11, '\x00', r5, 0x9, r6, 0x8, &(0x7f0000002c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002c40)={0x2, 0x5, 0x1, 0x50}, 0x10, 0x0, r7, 0x0, &(0x7f0000002fc0)=[r8, r9, r4, r10]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xff}, @jmp={0x5, 0x1, 0x8, 0x0, 0xa, 0x18, 0xffffffffffffffff}], &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x41000, 0x1c, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0xa, 0x10000000, 0x10000}, 0x10}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000000078000000780000000400000001000000050000040400000000000000030000000100000005000000010000006bfeffff0200000005000000010000000000000001000000ff0700000800000004000000000000000000000000000003000000000500000005000000090000001000000000070008050000000e0000000000000700000000002e3000"], &(0x7f0000000280)=""/237, 0x94, 0xed, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x58, &(0x7f0000001380)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r0, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000002900), &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002bc0)=0xffffffffffffffff, 0x4) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) (async) openat$cgroup_ro(r0, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r0, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r1, 0x6, 0x10}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x13, 0x5, &(0x7f0000001840)=ANY=[@ANYBLOB="180000000800000000000000ab0000ff0f00000000000002"], &(0x7f0000001880)='GPL\x00', 0x3, 0x1000, &(0x7f00000018c0)=""/4096, 0x40f00, 0x11, '\x00', r5, 0x9, r6, 0x8, &(0x7f0000002c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002c40)={0x2, 0x5, 0x1, 0x50}, 0x10, 0x0, r7, 0x0, &(0x7f0000002fc0)=[r8, r9, r4, r10]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xff}, @jmp={0x5, 0x1, 0x8, 0x0, 0xa, 0x18, 0xffffffffffffffff}], &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x41000, 0x1c, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0xa, 0x10000000, 0x10000}, 0x10}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000000078000000780000000400000001000000050000040400000000000000030000000100000005000000010000006bfeffff0200000005000000010000000000000001000000ff0700000800000004000000000000000000000000000003000000000500000005000000090000001000000000070008050000000e0000000000000700000000002e3000"], &(0x7f0000000280)=""/237, 0x94, 0xed, 0x1}, 0x20) (async) 23:31:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000010000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) [ 757.128410][ T2861] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 757.136221][ T2861] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 757.144039][ T2861] [ 757.166253][ T2873] FAULT_INJECTION: forcing a failure. [ 757.166253][ T2873] name failslab, interval 1, probability 0, space 0, times 0 23:31:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='blkio.bfq.io_queued\x00', 0x0, 0x0) 23:31:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x0, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x15, 0x10001, 0x3b, 0x4, 0x382, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) [ 757.180030][ T2873] CPU: 1 PID: 2873 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 757.191397][ T2873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 757.201467][ T2873] Call Trace: [ 757.204589][ T2873] [ 757.207373][ T2873] dump_stack_lvl+0x151/0x1b7 [ 757.211880][ T2873] ? bfq_pos_tree_add_move+0x43e/0x43e [ 757.217179][ T2873] dump_stack+0x15/0x17 [ 757.221166][ T2873] should_fail+0x3c0/0x510 [ 757.225420][ T2873] __should_failslab+0x9f/0xe0 23:31:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000140)='blkio.bfq.io_queued\x00', 0x0, 0x0) (async) [ 757.230020][ T2873] should_failslab+0x9/0x20 [ 757.234356][ T2873] kmem_cache_alloc+0x4f/0x2f0 [ 757.238956][ T2873] ? anon_vma_fork+0x1b9/0x4f0 [ 757.243561][ T2873] anon_vma_fork+0x1b9/0x4f0 [ 757.247988][ T2873] dup_mmap+0x750/0xea0 [ 757.251982][ T2873] ? __delayed_free_task+0x20/0x20 [ 757.257013][ T2873] ? mm_init+0x807/0x960 [ 757.261096][ T2873] dup_mm+0x91/0x330 [ 757.264825][ T2873] copy_mm+0x108/0x1b0 [ 757.268732][ T2873] copy_process+0x1295/0x3250 [ 757.273240][ T2873] ? proc_fail_nth_write+0x213/0x290 [ 757.278364][ T2873] ? proc_fail_nth_read+0x220/0x220 [ 757.283401][ T2873] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 757.288430][ T2873] ? vfs_write+0x9af/0x1050 [ 757.292781][ T2873] ? vmacache_update+0xb7/0x120 [ 757.297461][ T2873] kernel_clone+0x22d/0x990 [ 757.301796][ T2873] ? file_end_write+0x1b0/0x1b0 [ 757.306482][ T2873] ? __kasan_check_write+0x14/0x20 [ 757.311431][ T2873] ? create_io_thread+0x1e0/0x1e0 [ 757.316293][ T2873] ? __mutex_lock_slowpath+0x10/0x10 [ 757.321408][ T2873] __x64_sys_clone+0x289/0x310 [ 757.326006][ T2873] ? __do_sys_vfork+0x130/0x130 [ 757.330695][ T2873] ? debug_smp_processor_id+0x17/0x20 [ 757.335901][ T2873] do_syscall_64+0x44/0xd0 [ 757.340157][ T2873] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 757.345890][ T2873] RIP: 0033:0x7f14733430a9 [ 757.350135][ T2873] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 757.369577][ T2873] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 23:31:30 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 94) 23:31:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x3, 0x8}, 0xc) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) 23:31:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000100000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r0, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000002900), &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002bc0)=0xffffffffffffffff, 0x4) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) r8 = openat$cgroup_ro(r0, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r0, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r1, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x13, 0x5, &(0x7f0000001840)=ANY=[@ANYBLOB="180000000800000000000000ab0000ff0f00000000000002"], &(0x7f0000001880)='GPL\x00', 0x3, 0x1000, &(0x7f00000018c0)=""/4096, 0x40f00, 0x11, '\x00', r5, 0x9, r6, 0x8, &(0x7f0000002c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002c40)={0x2, 0x5, 0x1, 0x50}, 0x10, 0x0, r7, 0x0, &(0x7f0000002fc0)=[r8, r9, r4, r10]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xff}, @jmp={0x5, 0x1, 0x8, 0x0, 0xa, 0x18, 0xffffffffffffffff}], &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x41000, 0x1c, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0xa, 0x10000000, 0x10000}, 0x10}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000000078000000780000000400000001000000050000040400000000000000030000000100000005000000010000006bfeffff0200000005000000010000000000000001000000ff0700000800000004000000000000000000000000000003000000000500000005000000090000001000000000070008050000000e0000000000000700000000002e3000"], &(0x7f0000000280)=""/237, 0x94, 0xed, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x58, &(0x7f0000001380)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r0, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000002900), &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002bc0)=0xffffffffffffffff, 0x4) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) (async) openat$cgroup_ro(r0, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r0, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r1, 0x6, 0x10}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x13, 0x5, &(0x7f0000001840)=ANY=[@ANYBLOB="180000000800000000000000ab0000ff0f00000000000002"], &(0x7f0000001880)='GPL\x00', 0x3, 0x1000, &(0x7f00000018c0)=""/4096, 0x40f00, 0x11, '\x00', r5, 0x9, r6, 0x8, &(0x7f0000002c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002c40)={0x2, 0x5, 0x1, 0x50}, 0x10, 0x0, r7, 0x0, &(0x7f0000002fc0)=[r8, r9, r4, r10]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xff}, @jmp={0x5, 0x1, 0x8, 0x0, 0xa, 0x18, 0xffffffffffffffff}], &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x41000, 0x1c, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0xa, 0x10000000, 0x10000}, 0x10}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000000078000000780000000400000001000000050000040400000000000000030000000100000005000000010000006bfeffff0200000005000000010000000000000001000000ff0700000800000004000000000000000000000000000003000000000500000005000000090000001000000000070008050000000e0000000000000700000000002e3000"], &(0x7f0000000280)=""/237, 0x94, 0xed, 0x1}, 0x20) (async) 23:31:30 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r1], &(0x7f00000001c0)=""/144, 0x5, 0xfd98, 0x1}, 0x20) [ 757.377831][ T2873] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 757.385634][ T2873] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 757.393443][ T2873] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 757.401257][ T2873] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 757.409068][ T2873] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 757.416880][ T2873] 23:31:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}, {0x0, [0x30, 0x30, 0x30]}}, &(0x7f00000002c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 23:31:30 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="707bf4d07bcf7ffb9de6890004000000e0ffffffff000000750200"/42], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x66, &(0x7f00000001c0)=""/102, 0x40f00, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x3, 0x400, 0x7ac}, 0x10, 0x2d094, r0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 757.436899][ T2916] FAULT_INJECTION: forcing a failure. [ 757.436899][ T2916] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 757.453139][ T2916] CPU: 1 PID: 2916 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 757.464517][ T2916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 757.474421][ T2916] Call Trace: [ 757.477530][ T2916] [ 757.480308][ T2916] dump_stack_lvl+0x151/0x1b7 23:31:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:30 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r1], &(0x7f00000001c0)=""/144, 0x5, 0xfd98, 0x1}, 0x20) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r1], &(0x7f00000001c0)=""/144, 0x5, 0xfd98, 0x1}, 0x20) (async) 23:31:31 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="707bf4d07bcf7ffb9de6890004000000e0ffffffff000000750200"/42], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x66, &(0x7f00000001c0)=""/102, 0x40f00, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x3, 0x400, 0x7ac}, 0x10, 0x2d094, r0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 757.484825][ T2916] ? bfq_pos_tree_add_move+0x43e/0x43e [ 757.490116][ T2916] ? stack_trace_save+0x1f0/0x1f0 [ 757.494979][ T2916] ? __kernel_text_address+0x9a/0x110 [ 757.500188][ T2916] dump_stack+0x15/0x17 [ 757.504184][ T2916] should_fail+0x3c0/0x510 [ 757.508433][ T2916] should_fail_alloc_page+0x58/0x70 [ 757.513466][ T2916] __alloc_pages+0x1de/0x7c0 [ 757.517896][ T2916] ? stack_trace_save+0x12d/0x1f0 [ 757.522781][ T2916] ? stack_trace_snprint+0x100/0x100 [ 757.527880][ T2916] ? __count_vm_events+0x30/0x30 [ 757.532650][ T2916] ? __kasan_slab_alloc+0xc4/0xe0 [ 757.537507][ T2916] ? __kasan_slab_alloc+0xb2/0xe0 [ 757.542373][ T2916] ? kmem_cache_alloc+0x189/0x2f0 [ 757.547224][ T2916] ? anon_vma_fork+0x1b9/0x4f0 [ 757.551828][ T2916] get_zeroed_page+0x19/0x40 [ 757.556256][ T2916] __pud_alloc+0x8b/0x260 [ 757.560424][ T2916] ? do_handle_mm_fault+0x2370/0x2370 [ 757.565628][ T2916] copy_page_range+0xd9e/0x1090 [ 757.570319][ T2916] ? pfn_valid+0x1e0/0x1e0 [ 757.574567][ T2916] dup_mmap+0x99f/0xea0 [ 757.578555][ T2916] ? __delayed_free_task+0x20/0x20 [ 757.583502][ T2916] ? mm_init+0x807/0x960 [ 757.587582][ T2916] dup_mm+0x91/0x330 [ 757.591316][ T2916] copy_mm+0x108/0x1b0 [ 757.595219][ T2916] copy_process+0x1295/0x3250 [ 757.599731][ T2916] ? proc_fail_nth_write+0x213/0x290 [ 757.604851][ T2916] ? proc_fail_nth_read+0x220/0x220 [ 757.609890][ T2916] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 757.614833][ T2916] ? vfs_write+0x9af/0x1050 [ 757.619178][ T2916] ? vmacache_update+0xb7/0x120 [ 757.623869][ T2916] kernel_clone+0x22d/0x990 [ 757.628202][ T2916] ? file_end_write+0x1b0/0x1b0 [ 757.632890][ T2916] ? __kasan_check_write+0x14/0x20 [ 757.637835][ T2916] ? create_io_thread+0x1e0/0x1e0 [ 757.642695][ T2916] ? __mutex_lock_slowpath+0x10/0x10 [ 757.647817][ T2916] __x64_sys_clone+0x289/0x310 [ 757.652416][ T2916] ? __do_sys_vfork+0x130/0x130 [ 757.657102][ T2916] ? debug_smp_processor_id+0x17/0x20 [ 757.662310][ T2916] do_syscall_64+0x44/0xd0 [ 757.666562][ T2916] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 757.672291][ T2916] RIP: 0033:0x7f14733430a9 [ 757.676547][ T2916] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 757.695992][ T2916] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 757.704236][ T2916] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 757.712045][ T2916] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 757.719859][ T2916] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 757.727665][ T2916] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 23:31:31 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 95) 23:31:31 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r1], &(0x7f00000001c0)=""/144, 0x5, 0xfd98, 0x1}, 0x20) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r1], &(0x7f00000001c0)=""/144, 0x5, 0xfd98, 0x1}, 0x20) (async) 23:31:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x300000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:31 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="707bf4d07bcf7ffb9de6890004000000e0ffffffff000000750200"/42], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x66, &(0x7f00000001c0)=""/102, 0x40f00, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x3, 0x400, 0x7ac}, 0x10, 0x2d094, r0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x12, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x4, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x40000007}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) 23:31:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}, {0x0, [0x30, 0x30]}}, &(0x7f00000002c0)=""/232, 0x34, 0xe8, 0x1}, 0x20) [ 757.735478][ T2916] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 757.743304][ T2916] 23:31:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}, {0x0, [0x30]}}, &(0x7f00000002c0)=""/232, 0x33, 0xe8, 0x1}, 0x20) 23:31:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) [ 757.780553][ T2968] FAULT_INJECTION: forcing a failure. [ 757.780553][ T2968] name failslab, interval 1, probability 0, space 0, times 0 [ 757.796327][ T2968] CPU: 1 PID: 2968 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 757.807702][ T2968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 757.817596][ T2968] Call Trace: [ 757.820722][ T2968] [ 757.823497][ T2968] dump_stack_lvl+0x151/0x1b7 23:31:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x500000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:31 executing program 0: write$cgroup_pressure(0xffffffffffffffff, &(0x7f00000005c0)={'some', 0x20, 0x3, 0x20, 0x4}, 0x2f) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r1, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r1, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) openat$cgroup_ro(r1, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r1, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r7}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0xd, &(0x7f0000000600)=@raw=[@alu={0x7, 0x0, 0x6, 0x8, 0x5, 0x10, 0xffffffffffffffff}, @ldst={0x2, 0x1, 0x6, 0x2, 0x3, 0xc, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @ldst={0x0, 0x0, 0x1, 0x2, 0x1, 0x80, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x2, 0x2, 0xa, 0xb, 0x6, 0x8}], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r8, r8]}, 0x80) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x18}, 0xc) r10 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r10}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r11}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r11, r11]}, 0x80) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r12}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r13}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b8100000000008d09100000000000183a00000000000000000000000000001835000000000000000000000000000018140000", @ANYRES32, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300"/80], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r13, r13]}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x5, &(0x7f0000000300)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0x5d}, @exit, @map_fd={0x18, 0xb, 0x1, 0x0, r6}], &(0x7f0000000340)='GPL\x00', 0x0, 0xd3, &(0x7f0000000380)=""/211, 0x41100, 0x3, '\x00', r5, 0x25, r13, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x1, 0x101, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r11]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x5}, [@call={0x85, 0x0, 0x0, 0xcc}, @generic={0xdb, 0xa, 0xc, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}]}, &(0x7f0000000040)='GPL\x00', 0xf14a, 0x0, 0x0, 0x100, 0x16, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x10, 0x1000, 0x5fd3ecea}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x1, r8, r9, 0xffffffffffffffff, r11]}, 0x80) 23:31:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) [ 757.828012][ T2968] ? bfq_pos_tree_add_move+0x43e/0x43e [ 757.833308][ T2968] ? copy_namespaces+0x1d1/0x220 [ 757.838081][ T2968] ? kernel_clone+0x22d/0x990 [ 757.842592][ T2968] ? __x64_sys_clone+0x289/0x310 [ 757.847365][ T2968] ? do_syscall_64+0x44/0xd0 [ 757.851809][ T2968] dump_stack+0x15/0x17 [ 757.855785][ T2968] should_fail+0x3c0/0x510 [ 757.860038][ T2968] ? __register_sysctl_table+0xee/0x1330 [ 757.865505][ T2968] __should_failslab+0x9f/0xe0 [ 757.870106][ T2968] should_failslab+0x9/0x20 [ 757.874449][ T2968] __kmalloc+0x6d/0x350 [ 757.878442][ T2968] __register_sysctl_table+0xee/0x1330 [ 757.883823][ T2968] register_net_sysctl+0x239/0x250 [ 757.888774][ T2968] nf_log_net_init+0x3d3/0x490 [ 757.893377][ T2968] ops_init+0x1bf/0x4a0 [ 757.897369][ T2968] setup_net+0x34b/0xbb0 [ 757.901449][ T2968] ? __kasan_check_write+0x14/0x20 [ 757.906394][ T2968] ? copy_net_ns+0x5c0/0x5c0 [ 757.910813][ T2968] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 757.916203][ T2968] ? copy_net_ns+0x18a/0x5c0 [ 757.920620][ T2968] copy_net_ns+0x359/0x5c0 [ 757.924871][ T2968] create_new_namespaces+0x3d8/0x6e0 [ 757.929991][ T2968] copy_namespaces+0x1d1/0x220 [ 757.934589][ T2968] ? copy_mm+0x119/0x1b0 [ 757.938668][ T2968] copy_process+0x12dd/0x3250 [ 757.943182][ T2968] ? proc_fail_nth_write+0x213/0x290 [ 757.948307][ T2968] ? proc_fail_nth_read+0x220/0x220 [ 757.953334][ T2968] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 757.958287][ T2968] ? vfs_write+0x9af/0x1050 [ 757.962623][ T2968] ? vmacache_update+0xb7/0x120 [ 757.967311][ T2968] kernel_clone+0x22d/0x990 [ 757.971648][ T2968] ? file_end_write+0x1b0/0x1b0 [ 757.976336][ T2968] ? __kasan_check_write+0x14/0x20 [ 757.981283][ T2968] ? create_io_thread+0x1e0/0x1e0 [ 757.986665][ T2968] ? __mutex_lock_slowpath+0x10/0x10 [ 757.991785][ T2968] __x64_sys_clone+0x289/0x310 [ 757.996387][ T2968] ? __do_sys_vfork+0x130/0x130 [ 758.001074][ T2968] ? debug_smp_processor_id+0x17/0x20 [ 758.006279][ T2968] do_syscall_64+0x44/0xd0 [ 758.010532][ T2968] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 758.016265][ T2968] RIP: 0033:0x7f14733430a9 [ 758.020516][ T2968] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 758.040217][ T2968] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 758.048461][ T2968] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 758.056362][ T2968] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 758.064173][ T2968] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.071984][ T2968] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 758.079791][ T2968] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 758.087608][ T2968] 23:31:31 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 96) 23:31:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) 23:31:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x600000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:31 executing program 0: write$cgroup_pressure(0xffffffffffffffff, &(0x7f00000005c0)={'some', 0x20, 0x3, 0x20, 0x4}, 0x2f) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async, rerun: 64) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r1, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1]}, 0x80) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r1, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) openat$cgroup_ro(r1, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r1, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r7}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r8}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0xd, &(0x7f0000000600)=@raw=[@alu={0x7, 0x0, 0x6, 0x8, 0x5, 0x10, 0xffffffffffffffff}, @ldst={0x2, 0x1, 0x6, 0x2, 0x3, 0xc, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @ldst={0x0, 0x0, 0x1, 0x2, 0x1, 0x80, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x2, 0x2, 0xa, 0xb, 0x6, 0x8}], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r8, r8]}, 0x80) (async) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x18}, 0xc) r10 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r10}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r11}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r11, r11]}, 0x80) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r12}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r13}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b8100000000008d09100000000000183a00000000000000000000000000001835000000000000000000000000000018140000", @ANYRES32, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300"/80], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r13, r13]}, 0x80) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x5, &(0x7f0000000300)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0x5d}, @exit, @map_fd={0x18, 0xb, 0x1, 0x0, r6}], &(0x7f0000000340)='GPL\x00', 0x0, 0xd3, &(0x7f0000000380)=""/211, 0x41100, 0x3, '\x00', r5, 0x25, r13, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x1, 0x101, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r11]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x5}, [@call={0x85, 0x0, 0x0, 0xcc}, @generic={0xdb, 0xa, 0xc, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}]}, &(0x7f0000000040)='GPL\x00', 0xf14a, 0x0, 0x0, 0x100, 0x16, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x10, 0x1000, 0x5fd3ecea}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x1, r8, r9, 0xffffffffffffffff, r11]}, 0x80) 23:31:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8, 0x1}, 0x20) 23:31:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000e20000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 23:31:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x700000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 23:31:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) 23:31:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000e20000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 758.202440][ T3001] FAULT_INJECTION: forcing a failure. [ 758.202440][ T3001] name failslab, interval 1, probability 0, space 0, times 0 [ 758.219976][ T3001] CPU: 1 PID: 3001 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 758.231351][ T3001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 758.241248][ T3001] Call Trace: [ 758.244376][ T3001] [ 758.247153][ T3001] dump_stack_lvl+0x151/0x1b7 [ 758.251667][ T3001] ? bfq_pos_tree_add_move+0x43e/0x43e [ 758.256956][ T3001] dump_stack+0x15/0x17 [ 758.260948][ T3001] should_fail+0x3c0/0x510 [ 758.265212][ T3001] ? __register_sysctl_table+0xa66/0x1330 [ 758.270756][ T3001] __should_failslab+0x9f/0xe0 [ 758.275362][ T3001] should_failslab+0x9/0x20 [ 758.279697][ T3001] __kmalloc+0x6d/0x350 [ 758.283691][ T3001] __register_sysctl_table+0xa66/0x1330 [ 758.289072][ T3001] register_net_sysctl+0x239/0x250 [ 758.294016][ T3001] nf_log_net_init+0x3d3/0x490 [ 758.298617][ T3001] ops_init+0x1bf/0x4a0 [ 758.302611][ T3001] setup_net+0x34b/0xbb0 [ 758.306686][ T3001] ? __kasan_check_write+0x14/0x20 [ 758.311641][ T3001] ? copy_net_ns+0x5c0/0x5c0 [ 758.316063][ T3001] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 758.321442][ T3001] ? copy_net_ns+0x18a/0x5c0 [ 758.325866][ T3001] copy_net_ns+0x359/0x5c0 [ 758.330118][ T3001] create_new_namespaces+0x3d8/0x6e0 [ 758.335251][ T3001] copy_namespaces+0x1d1/0x220 [ 758.339837][ T3001] ? copy_mm+0x119/0x1b0 [ 758.343917][ T3001] copy_process+0x12dd/0x3250 [ 758.348520][ T3001] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 758.353465][ T3001] kernel_clone+0x22d/0x990 [ 758.357808][ T3001] ? create_io_thread+0x1e0/0x1e0 [ 758.362665][ T3001] __x64_sys_clone+0x289/0x310 [ 758.367268][ T3001] ? __do_sys_vfork+0x130/0x130 [ 758.371952][ T3001] ? switch_fpu_return+0xe/0x10 [ 758.376638][ T3001] ? arch_exit_to_user_mode_prepare+0x48/0x70 [ 758.382541][ T3001] do_syscall_64+0x44/0xd0 [ 758.386792][ T3001] ? irqentry_exit+0x12/0x40 [ 758.391221][ T3001] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 758.396947][ T3001] RIP: 0033:0x7f14733430a9 [ 758.401201][ T3001] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 758.420644][ T3001] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 758.428887][ T3001] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 758.436700][ T3001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 758.444517][ T3001] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.452322][ T3001] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 758.460134][ T3001] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 758.467947][ T3001] [ 758.472541][ T3001] sysctl could not get directory: /net//netfilter -12 [ 758.479494][ T3001] CPU: 1 PID: 3001 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 758.490850][ T3001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 758.500740][ T3001] Call Trace: [ 758.503863][ T3001] [ 758.506651][ T3001] dump_stack_lvl+0x151/0x1b7 [ 758.511154][ T3001] ? slab_free_freelist_hook+0xc9/0x1a0 [ 758.516535][ T3001] ? bfq_pos_tree_add_move+0x43e/0x43e [ 758.521831][ T3001] ? kfree+0xc8/0x210 [ 758.525649][ T3001] dump_stack+0x15/0x17 [ 758.529641][ T3001] __register_sysctl_table+0x1298/0x1330 [ 758.535109][ T3001] register_net_sysctl+0x239/0x250 [ 758.540056][ T3001] nf_log_net_init+0x3d3/0x490 [ 758.544656][ T3001] ops_init+0x1bf/0x4a0 [ 758.548649][ T3001] setup_net+0x34b/0xbb0 [ 758.552728][ T3001] ? __kasan_check_write+0x14/0x20 [ 758.557673][ T3001] ? copy_net_ns+0x5c0/0x5c0 [ 758.562101][ T3001] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 758.567483][ T3001] ? copy_net_ns+0x18a/0x5c0 [ 758.571909][ T3001] copy_net_ns+0x359/0x5c0 [ 758.576163][ T3001] create_new_namespaces+0x3d8/0x6e0 [ 758.581286][ T3001] copy_namespaces+0x1d1/0x220 [ 758.585882][ T3001] ? copy_mm+0x119/0x1b0 [ 758.589964][ T3001] copy_process+0x12dd/0x3250 [ 758.594478][ T3001] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 758.599424][ T3001] kernel_clone+0x22d/0x990 [ 758.603763][ T3001] ? create_io_thread+0x1e0/0x1e0 [ 758.608623][ T3001] __x64_sys_clone+0x289/0x310 [ 758.613225][ T3001] ? __do_sys_vfork+0x130/0x130 [ 758.617912][ T3001] ? switch_fpu_return+0xe/0x10 [ 758.622597][ T3001] ? arch_exit_to_user_mode_prepare+0x48/0x70 [ 758.628500][ T3001] do_syscall_64+0x44/0xd0 [ 758.632751][ T3001] ? irqentry_exit+0x12/0x40 [ 758.637180][ T3001] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 758.642906][ T3001] RIP: 0033:0x7f14733430a9 [ 758.647160][ T3001] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 758.666600][ T3001] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 758.674867][ T3001] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 758.682659][ T3001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 758.690472][ T3001] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.698283][ T3001] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 758.706096][ T3001] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 758.713907][ T3001] 23:31:32 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 97) 23:31:32 executing program 0: write$cgroup_pressure(0xffffffffffffffff, &(0x7f00000005c0)={'some', 0x20, 0x3, 0x20, 0x4}, 0x2f) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r1, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f00000012c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb}, @generic={0x1, 0x6, 0x9, 0x80, 0x62}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1]}, 0x80) (async, rerun: 64) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (rerun: 64) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r3}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r4}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r1, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r4, r4]}, 0x80) openat$cgroup_ro(r1, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r1, 0x3, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async, rerun: 64) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r7}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r8}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0xd, &(0x7f0000000600)=@raw=[@alu={0x7, 0x0, 0x6, 0x8, 0x5, 0x10, 0xffffffffffffffff}, @ldst={0x2, 0x1, 0x6, 0x2, 0x3, 0xc, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @ldst={0x0, 0x0, 0x1, 0x2, 0x1, 0x80, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x2, 0x2, 0xa, 0xb, 0x6, 0x8}], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r8, r8]}, 0x80) (async) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7, 0x18}, 0xc) (async) r10 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r10}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r11}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r11, r11]}, 0x80) (async) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r12}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r13}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=ANY=[@ANYBLOB="180000000000001000000000000001002d1b8100000000008d09100000000000183a00000000000000000000000000001835000000000000000000000000000018140000", @ANYRES32, @ANYBLOB="00000000000000001830000004000000000000000000000018510000040000000000000000000000184b0000080000000000000000000000184400000300"/80], &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r13, r13]}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x5, &(0x7f0000000300)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0x5d}, @exit, @map_fd={0x18, 0xb, 0x1, 0x0, r6}], &(0x7f0000000340)='GPL\x00', 0x0, 0xd3, &(0x7f0000000380)=""/211, 0x41100, 0x3, '\x00', r5, 0x25, r13, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x1, 0x101, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r11]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x5}, [@call={0x85, 0x0, 0x0, 0xcc}, @generic={0xdb, 0xa, 0xc, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}]}, &(0x7f0000000040)='GPL\x00', 0xf14a, 0x0, 0x0, 0x100, 0x16, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x10, 0x1000, 0x5fd3ecea}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x1, r8, r9, 0xffffffffffffffff, r11]}, 0x80) 23:31:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 23:31:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) 23:31:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000e20000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8}, 0x20) 23:31:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) [ 758.783683][ T3020] FAULT_INJECTION: forcing a failure. [ 758.783683][ T3020] name failslab, interval 1, probability 0, space 0, times 0 [ 758.796707][ T3020] CPU: 1 PID: 3020 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 758.808076][ T3020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 758.817970][ T3020] Call Trace: [ 758.821092][ T3020] [ 758.823869][ T3020] dump_stack_lvl+0x151/0x1b7 [ 758.828382][ T3020] ? bfq_pos_tree_add_move+0x43e/0x43e 23:31:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a5ad29eedeab15dfc77fd6f78f4a903f528af94956aaf9d4a0145f4d38331184e7724e0d2559f1f03e4f124b3ba01018922e0cc121f981a7659981006ad5a250ae261eeaf51a4854ee8c1715a140d25f24e0fa03b97747cccdb007b8a301d8a85a9c0ae706c23af4242ee418705238"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x5, 0xffffffff, 0x20, 0x7, 0x54, 0x1, 0x793, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) openat$cgroup_subtree(r0, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xd}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x0, &(0x7f0000000140), 0x41100, 0x2, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xf, 0x3, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 23:31:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8}, 0x20) 23:31:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8}, 0x20) [ 758.833681][ T3020] dump_stack+0x15/0x17 [ 758.837668][ T3020] should_fail+0x3c0/0x510 [ 758.841925][ T3020] __should_failslab+0x9f/0xe0 [ 758.846522][ T3020] should_failslab+0x9/0x20 [ 758.850866][ T3020] kmem_cache_alloc+0x4f/0x2f0 [ 758.855459][ T3020] ? vm_area_dup+0x26/0x1d0 [ 758.859807][ T3020] vm_area_dup+0x26/0x1d0 [ 758.863967][ T3020] dup_mmap+0x6b8/0xea0 [ 758.867967][ T3020] ? __delayed_free_task+0x20/0x20 [ 758.872910][ T3020] ? mm_init+0x807/0x960 [ 758.876983][ T3020] dup_mm+0x91/0x330 [ 758.880716][ T3020] copy_mm+0x108/0x1b0 [ 758.884618][ T3020] copy_process+0x1295/0x3250 [ 758.889134][ T3020] ? proc_fail_nth_write+0x213/0x290 [ 758.894251][ T3020] ? proc_fail_nth_read+0x220/0x220 [ 758.899289][ T3020] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 758.904235][ T3020] ? vfs_write+0x9af/0x1050 [ 758.908575][ T3020] ? vmacache_update+0xb7/0x120 [ 758.913261][ T3020] kernel_clone+0x22d/0x990 [ 758.917600][ T3020] ? file_end_write+0x1b0/0x1b0 [ 758.923266][ T3020] ? __kasan_check_write+0x14/0x20 [ 758.928210][ T3020] ? create_io_thread+0x1e0/0x1e0 [ 758.933071][ T3020] ? __mutex_lock_slowpath+0x10/0x10 [ 758.938281][ T3020] __x64_sys_clone+0x289/0x310 [ 758.942879][ T3020] ? __do_sys_vfork+0x130/0x130 [ 758.947564][ T3020] ? debug_smp_processor_id+0x17/0x20 [ 758.952776][ T3020] do_syscall_64+0x44/0xd0 [ 758.957024][ T3020] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 758.962752][ T3020] RIP: 0033:0x7f14733430a9 [ 758.967005][ T3020] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 758.986450][ T3020] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 758.994694][ T3020] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 759.002507][ T3020] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 759.010319][ T3020] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 759.018130][ T3020] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 759.025942][ T3020] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 23:31:32 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 98) 23:31:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) 23:31:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a5ad29eedeab15dfc77fd6f78f4a903f528af94956aaf9d4a0145f4d38331184e7724e0d2559f1f03e4f124b3ba01018922e0cc121f981a7659981006ad5a250ae261eeaf51a4854ee8c1715a140d25f24e0fa03b97747cccdb007b8a301d8a85a9c0ae706c23af4242ee418705238"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x5, 0xffffffff, 0x20, 0x7, 0x54, 0x1, 0x793, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) openat$cgroup_subtree(r0, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xd}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x0, &(0x7f0000000140), 0x41100, 0x2, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xf, 0x3, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a5ad29eedeab15dfc77fd6f78f4a903f528af94956aaf9d4a0145f4d38331184e7724e0d2559f1f03e4f124b3ba01018922e0cc121f981a7659981006ad5a250ae261eeaf51a4854ee8c1715a140d25f24e0fa03b97747cccdb007b8a301d8a85a9c0ae706c23af4242ee418705238"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x5, 0xffffffff, 0x20, 0x7, 0x54, 0x1, 0x793, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) (async) openat$cgroup_subtree(r0, &(0x7f0000000140), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xd}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x0, &(0x7f0000000140), 0x41100, 0x2, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xf, 0x3, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) 23:31:32 executing program 0: ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x70400, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'hsr0\x00', 0x200}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000140)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @jmp={0x5, 0x1, 0x0, 0x8, 0x2, 0xffffffffffffffff, 0xffffffffffffffff}, @ldst={0x2, 0x1, 0x6, 0xa, 0x9, 0xc, 0x8}], &(0x7f0000000180)='GPL\x00', 0x1f, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x6, 0xa8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000300)=r2) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)=0x1) 23:31:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a5ad29eedeab15dfc77fd6f78f4a903f528af94956aaf9d4a0145f4d38331184e7724e0d2559f1f03e4f124b3ba01018922e0cc121f981a7659981006ad5a250ae261eeaf51a4854ee8c1715a140d25f24e0fa03b97747cccdb007b8a301d8a85a9c0ae706c23af4242ee418705238"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x5, 0xffffffff, 0x20, 0x7, 0x54, 0x1, 0x793, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) openat$cgroup_subtree(r0, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xd}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x0, &(0x7f0000000140), 0x41100, 0x2, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xf, 0x3, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a5ad29eedeab15dfc77fd6f78f4a903f528af94956aaf9d4a0145f4d38331184e7724e0d2559f1f03e4f124b3ba01018922e0cc121f981a7659981006ad5a250ae261eeaf51a4854ee8c1715a140d25f24e0fa03b97747cccdb007b8a301d8a85a9c0ae706c23af4242ee418705238"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x5, 0xffffffff, 0x20, 0x7, 0x54, 0x1, 0x793, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) (async) openat$cgroup_subtree(r0, &(0x7f0000000140), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xd}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x0, &(0x7f0000000140), 0x41100, 0x2, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xf, 0x3, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) [ 759.033758][ T3020] 23:31:32 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000100000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) 23:31:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:32 executing program 5: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2d, 'rdma'}, {0x3b, 'net_cls'}]}, 0xf) r0 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xb7, 0xd4, 0x5, 0x4, 0x0, 0x9, 0x6082, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f0000000140)}, 0x29, 0xffffffff, 0xc6, 0x3, 0x40, 0x852, 0x59, 0x0, 0x3, 0x0, 0x41}, 0x0, 0x8, 0xffffffffffffffff, 0x8) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 759.064772][ T3044] FAULT_INJECTION: forcing a failure. [ 759.064772][ T3044] name failslab, interval 1, probability 0, space 0, times 0 [ 759.088546][ T3044] CPU: 1 PID: 3044 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 759.099940][ T3044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 759.109819][ T3044] Call Trace: 23:31:32 executing program 5: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2d, 'rdma'}, {0x3b, 'net_cls'}]}, 0xf) (async) r0 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xb7, 0xd4, 0x5, 0x4, 0x0, 0x9, 0x6082, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f0000000140)}, 0x29, 0xffffffff, 0xc6, 0x3, 0x40, 0x852, 0x59, 0x0, 0x3, 0x0, 0x41}, 0x0, 0x8, 0xffffffffffffffff, 0x8) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) [ 759.112939][ T3044] [ 759.115718][ T3044] dump_stack_lvl+0x151/0x1b7 [ 759.120236][ T3044] ? bfq_pos_tree_add_move+0x43e/0x43e [ 759.125527][ T3044] ? cred_has_capability+0x2ca/0x420 [ 759.130650][ T3044] dump_stack+0x15/0x17 [ 759.134642][ T3044] should_fail+0x3c0/0x510 [ 759.138901][ T3044] __should_failslab+0x9f/0xe0 [ 759.143494][ T3044] should_failslab+0x9/0x20 [ 759.147832][ T3044] kmem_cache_alloc+0x4f/0x2f0 [ 759.152437][ T3044] ? create_new_namespaces+0x35/0x6e0 [ 759.157636][ T3044] create_new_namespaces+0x35/0x6e0 [ 759.162674][ T3044] ? security_capable+0xb2/0xd0 [ 759.167361][ T3044] copy_namespaces+0x1d1/0x220 [ 759.171960][ T3044] ? copy_mm+0x119/0x1b0 [ 759.176042][ T3044] copy_process+0x12dd/0x3250 [ 759.180553][ T3044] ? proc_fail_nth_write+0x213/0x290 [ 759.185674][ T3044] ? proc_fail_nth_read+0x220/0x220 [ 759.190730][ T3044] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 759.195651][ T3044] ? vfs_write+0x9af/0x1050 [ 759.199996][ T3044] ? vmacache_update+0xb7/0x120 [ 759.204690][ T3044] kernel_clone+0x22d/0x990 [ 759.209021][ T3044] ? file_end_write+0x1b0/0x1b0 [ 759.213705][ T3044] ? __kasan_check_write+0x14/0x20 [ 759.218651][ T3044] ? create_io_thread+0x1e0/0x1e0 [ 759.223512][ T3044] ? __mutex_lock_slowpath+0x10/0x10 [ 759.228631][ T3044] __x64_sys_clone+0x289/0x310 [ 759.233233][ T3044] ? __do_sys_vfork+0x130/0x130 [ 759.237918][ T3044] ? debug_smp_processor_id+0x17/0x20 [ 759.243142][ T3044] do_syscall_64+0x44/0xd0 [ 759.247380][ T3044] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 759.253106][ T3044] RIP: 0033:0x7f14733430a9 [ 759.257361][ T3044] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 759.276800][ T3044] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 759.285045][ T3044] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 759.292865][ T3044] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 759.300673][ T3044] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:32 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 99) 23:31:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:32 executing program 1: socketpair(0x1e, 0x2, 0x3, &(0x7f0000001200)) 23:31:32 executing program 5: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2d, 'rdma'}, {0x3b, 'net_cls'}]}, 0xf) (async) r0 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xb7, 0xd4, 0x5, 0x4, 0x0, 0x9, 0x6082, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f0000000140)}, 0x29, 0xffffffff, 0xc6, 0x3, 0x40, 0x852, 0x59, 0x0, 0x3, 0x0, 0x41}, 0x0, 0x8, 0xffffffffffffffff, 0x8) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:32 executing program 0: ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x70400, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'hsr0\x00', 0x200}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000140)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @jmp={0x5, 0x1, 0x0, 0x8, 0x2, 0xffffffffffffffff, 0xffffffffffffffff}, @ldst={0x2, 0x1, 0x6, 0xa, 0x9, 0xc, 0x8}], &(0x7f0000000180)='GPL\x00', 0x1f, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x6, 0xa8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000300)=r2) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)=0x1) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000000)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x70400, 0x0) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'hsr0\x00', 0x200}) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000140)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @jmp={0x5, 0x1, 0x0, 0x8, 0x2, 0xffffffffffffffff, 0xffffffffffffffff}, @ldst={0x2, 0x1, 0x6, 0xa, 0x9, 0xc, 0x8}], &(0x7f0000000180)='GPL\x00', 0x1f, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x6, 0xa8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) (async) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000300)=r2) (async) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)=0x1) (async) 23:31:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:32 executing program 1: socketpair(0x0, 0x2, 0x3, &(0x7f0000001200)) 23:31:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 759.308482][ T3044] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 759.316293][ T3044] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 759.324111][ T3044] [ 759.343441][ T3084] FAULT_INJECTION: forcing a failure. [ 759.343441][ T3084] name failslab, interval 1, probability 0, space 0, times 0 23:31:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:32 executing program 5: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:32 executing program 5: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) 23:31:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 759.364454][ T3084] CPU: 1 PID: 3084 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 759.375827][ T3084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 759.385734][ T3084] Call Trace: [ 759.388845][ T3084] [ 759.391624][ T3084] dump_stack_lvl+0x151/0x1b7 [ 759.396137][ T3084] ? bfq_pos_tree_add_move+0x43e/0x43e [ 759.401432][ T3084] ? __kasan_check_write+0x14/0x20 [ 759.406377][ T3084] ? _raw_spin_lock_irq+0xa4/0x1b0 [ 759.411324][ T3084] ? _raw_spin_lock_irqsave+0x210/0x210 [ 759.416708][ T3084] dump_stack+0x15/0x17 [ 759.420703][ T3084] should_fail+0x3c0/0x510 [ 759.424956][ T3084] ? copy_net_ns+0x10a/0x5c0 [ 759.429377][ T3084] __should_failslab+0x9f/0xe0 [ 759.433975][ T3084] should_failslab+0x9/0x20 [ 759.438323][ T3084] __kmalloc+0x6d/0x350 [ 759.442311][ T3084] ? __kasan_check_write+0x14/0x20 [ 759.447267][ T3084] ? inc_ucount+0x1c4/0x2b0 [ 759.451598][ T3084] copy_net_ns+0x10a/0x5c0 [ 759.455846][ T3084] ? __kasan_check_write+0x14/0x20 [ 759.460792][ T3084] ? copy_cgroup_ns+0x92/0x4d0 [ 759.465395][ T3084] create_new_namespaces+0x3d8/0x6e0 [ 759.470514][ T3084] copy_namespaces+0x1d1/0x220 [ 759.475114][ T3084] ? copy_mm+0x119/0x1b0 [ 759.479195][ T3084] copy_process+0x12dd/0x3250 [ 759.483709][ T3084] ? proc_fail_nth_write+0x213/0x290 [ 759.488828][ T3084] ? proc_fail_nth_read+0x220/0x220 [ 759.493870][ T3084] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 759.498811][ T3084] ? vfs_write+0x9af/0x1050 [ 759.503151][ T3084] ? vmacache_update+0xb7/0x120 [ 759.507837][ T3084] kernel_clone+0x22d/0x990 [ 759.512177][ T3084] ? file_end_write+0x1b0/0x1b0 [ 759.516863][ T3084] ? __kasan_check_write+0x14/0x20 [ 759.521809][ T3084] ? create_io_thread+0x1e0/0x1e0 [ 759.526678][ T3084] ? __mutex_lock_slowpath+0x10/0x10 [ 759.531789][ T3084] __x64_sys_clone+0x289/0x310 [ 759.536392][ T3084] ? __do_sys_vfork+0x130/0x130 [ 759.541078][ T3084] ? debug_smp_processor_id+0x17/0x20 [ 759.546285][ T3084] do_syscall_64+0x44/0xd0 [ 759.550538][ T3084] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 759.556266][ T3084] RIP: 0033:0x7f14733430a9 [ 759.560520][ T3084] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 759.579962][ T3084] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 759.588207][ T3084] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 759.596016][ T3084] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 759.603827][ T3084] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 23:31:33 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 100) 23:31:33 executing program 1: socketpair(0x0, 0x2, 0x3, &(0x7f0000001200)) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:33 executing program 5: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 0: ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x70400, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'hsr0\x00', 0x200}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000140)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @jmp={0x5, 0x1, 0x0, 0x8, 0x2, 0xffffffffffffffff, 0xffffffffffffffff}, @ldst={0x2, 0x1, 0x6, 0xa, 0x9, 0xc, 0x8}], &(0x7f0000000180)='GPL\x00', 0x1f, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x6, 0xa8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000300)=r2) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)=0x1) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000000)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x70400, 0x0) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'hsr0\x00', 0x200}) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000140)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @jmp={0x5, 0x1, 0x0, 0x8, 0x2, 0xffffffffffffffff, 0xffffffffffffffff}, @ldst={0x2, 0x1, 0x6, 0xa, 0x9, 0xc, 0x8}], &(0x7f0000000180)='GPL\x00', 0x1f, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x6, 0xa8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) (async) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000300)=r2) (async) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)=0x1) (async) 23:31:33 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:33 executing program 1: socketpair(0x0, 0x2, 0x3, &(0x7f0000001200)) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 759.611639][ T3084] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 759.619450][ T3084] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 759.627268][ T3084] 23:31:33 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) [ 759.683513][ T3130] FAULT_INJECTION: forcing a failure. [ 759.683513][ T3130] name failslab, interval 1, probability 0, space 0, times 0 [ 759.705766][ T3130] CPU: 1 PID: 3130 Comm: syz-executor.4 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 759.717144][ T3130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 759.727034][ T3130] Call Trace: [ 759.730159][ T3130] [ 759.732936][ T3130] dump_stack_lvl+0x151/0x1b7 [ 759.737449][ T3130] ? bfq_pos_tree_add_move+0x43e/0x43e [ 759.742742][ T3130] ? cred_has_capability+0x2ca/0x420 [ 759.747862][ T3130] dump_stack+0x15/0x17 [ 759.751865][ T3130] should_fail+0x3c0/0x510 [ 759.756111][ T3130] __should_failslab+0x9f/0xe0 [ 759.760710][ T3130] should_failslab+0x9/0x20 [ 759.765049][ T3130] kmem_cache_alloc+0x4f/0x2f0 [ 759.769650][ T3130] ? create_new_namespaces+0x35/0x6e0 [ 759.774856][ T3130] create_new_namespaces+0x35/0x6e0 [ 759.779892][ T3130] ? security_capable+0xb2/0xd0 [ 759.784576][ T3130] copy_namespaces+0x1d1/0x220 [ 759.789175][ T3130] ? copy_mm+0x119/0x1b0 [ 759.793254][ T3130] copy_process+0x12dd/0x3250 [ 759.797771][ T3130] ? proc_fail_nth_write+0x213/0x290 [ 759.802915][ T3130] ? proc_fail_nth_read+0x220/0x220 [ 759.807923][ T3130] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 759.812869][ T3130] ? vfs_write+0x9af/0x1050 [ 759.817210][ T3130] ? vmacache_update+0xb7/0x120 [ 759.821897][ T3130] kernel_clone+0x22d/0x990 [ 759.826238][ T3130] ? file_end_write+0x1b0/0x1b0 [ 759.830925][ T3130] ? __kasan_check_write+0x14/0x20 [ 759.835872][ T3130] ? create_io_thread+0x1e0/0x1e0 [ 759.840733][ T3130] ? __mutex_lock_slowpath+0x10/0x10 [ 759.845851][ T3130] __x64_sys_clone+0x289/0x310 [ 759.850453][ T3130] ? __do_sys_vfork+0x130/0x130 [ 759.855141][ T3130] ? debug_smp_processor_id+0x17/0x20 [ 759.860346][ T3130] do_syscall_64+0x44/0xd0 [ 759.864602][ T3130] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 759.870328][ T3130] RIP: 0033:0x7f14733430a9 [ 759.874586][ T3130] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 759.894022][ T3130] RSP: 002b:00007f14720b6118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 759.902268][ T3130] RAX: ffffffffffffffda RBX: 00007f1473462f80 RCX: 00007f14733430a9 [ 759.910078][ T3130] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 759.917986][ T3130] RBP: 00007f14720b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 759.925790][ T3130] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 23:31:33 executing program 4: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:33 executing program 1: socketpair(0x1e, 0x0, 0x3, &(0x7f0000001200)) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:33 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0xbd2f, 0x0}, 0x8) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1d, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x671, 0x0, 0x0, 0x0, 0x1}, [@map_fd={0x18, 0x7, 0x1, 0x0, r2}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @generic={0x3f, 0x0, 0x5, 0x5}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffa}, @map_fd={0x18, 0x6}, @call={0x85, 0x0, 0x0, 0x9b}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x7b, &(0x7f0000000240)=""/123, 0x41100, 0xb, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0xfffffffc, 0x7ff}, 0x10, r0}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:33 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0xbd2f, 0x0}, 0x8) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1d, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x671, 0x0, 0x0, 0x0, 0x1}, [@map_fd={0x18, 0x7, 0x1, 0x0, r2}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @generic={0x3f, 0x0, 0x5, 0x5}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffa}, @map_fd={0x18, 0x6}, @call={0x85, 0x0, 0x0, 0x9b}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x7b, &(0x7f0000000240)=""/123, 0x41100, 0xb, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0xfffffffc, 0x7ff}, 0x10, r0}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 1: socketpair(0x1e, 0x0, 0x0, &(0x7f0000001200)) 23:31:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/8, 0x8, 0x0, &(0x7f00000001c0)=""/85, 0x55}}, 0x10) [ 759.933600][ T3130] R13: 00007ffc9cd853ef R14: 00007f14720b6300 R15: 0000000000022000 [ 759.941414][ T3130] 23:31:33 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0xbd2f, 0x0}, 0x8) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1d, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x671, 0x0, 0x0, 0x0, 0x1}, [@map_fd={0x18, 0x7, 0x1, 0x0, r2}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @generic={0x3f, 0x0, 0x5, 0x5}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffa}, @map_fd={0x18, 0x6}, @call={0x85, 0x0, 0x0, 0x9b}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x7b, &(0x7f0000000240)=""/123, 0x41100, 0xb, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0xfffffffc, 0x7ff}, 0x10, r0}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 4: syz_clone(0xd000000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:33 executing program 1: socketpair(0x1e, 0x0, 0x0, &(0x7f0000001200)) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:33 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) r2 = perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x80, 0x82, 0x0, 0x2, 0x0, 0xef8, 0x8200, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x8, @perf_bp={&(0x7f0000000480), 0x4}, 0x1a004, 0x1, 0x7, 0xf, 0x6, 0x4, 0x29d, 0x0, 0x7ff, 0x0, 0x7fffffffffffffff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000540)='}#-\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={r0, 0x20, &(0x7f0000000a40)={&(0x7f0000000840)=""/234, 0xea, 0x0, &(0x7f0000000940)=""/194, 0xc2}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000580)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f00000005c0)='syzkaller\x00', 0xff, 0xab, &(0x7f0000000600)=""/171, 0x0, 0x5, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000007c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x4, 0x10, 0x10000}, 0x10, r5, 0x0, 0x0, &(0x7f0000000ac0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x14, 0x1, 0x20, 0x8, 0xb00, r0, 0x4, '\x00', r1, r0, 0x4, 0x3, 0x4}, 0x48) 23:31:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/8, 0x8, 0x0, &(0x7f00000001c0)=""/85, 0x55}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/8, 0x8, 0x0, &(0x7f00000001c0)=""/85, 0x55}}, 0x10) (async) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x500}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 1: socketpair(0x1e, 0x0, 0x0, &(0x7f0000001200)) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x600}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 1: socketpair(0x1e, 0x0, 0x3, 0x0) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:33 executing program 4: syz_clone(0x40000002, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:33 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) r2 = perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x80, 0x82, 0x0, 0x2, 0x0, 0xef8, 0x8200, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x8, @perf_bp={&(0x7f0000000480), 0x4}, 0x1a004, 0x1, 0x7, 0xf, 0x6, 0x4, 0x29d, 0x0, 0x7ff, 0x0, 0x7fffffffffffffff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000540)='}#-\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={r0, 0x20, &(0x7f0000000a40)={&(0x7f0000000840)=""/234, 0xea, 0x0, &(0x7f0000000940)=""/194, 0xc2}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000580)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f00000005c0)='syzkaller\x00', 0xff, 0xab, &(0x7f0000000600)=""/171, 0x0, 0x5, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000007c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x4, 0x10, 0x10000}, 0x10, r5, 0x0, 0x0, &(0x7f0000000ac0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x14, 0x1, 0x20, 0x8, 0xb00, r0, 0x4, '\x00', r1, r0, 0x4, 0x3, 0x4}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) (async) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x80, 0x82, 0x0, 0x2, 0x0, 0xef8, 0x8200, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x8, @perf_bp={&(0x7f0000000480), 0x4}, 0x1a004, 0x1, 0x7, 0xf, 0x6, 0x4, 0x29d, 0x0, 0x7ff, 0x0, 0x7fffffffffffffff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xb) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000540)='}#-\x00') (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x58, &(0x7f00000006c0)}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={r0, 0x20, &(0x7f0000000a40)={&(0x7f0000000840)=""/234, 0xea, 0x0, &(0x7f0000000940)=""/194, 0xc2}}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000580)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f00000005c0)='syzkaller\x00', 0xff, 0xab, &(0x7f0000000600)=""/171, 0x0, 0x5, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000007c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x4, 0x10, 0x10000}, 0x10, r5, 0x0, 0x0, &(0x7f0000000ac0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x14, 0x1, 0x20, 0x8, 0xb00, r0, 0x4, '\x00', r1, r0, 0x4, 0x3, 0x4}, 0x48) (async) 23:31:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/8, 0x8, 0x0, &(0x7f00000001c0)=""/85, 0x55}}, 0x10) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x700}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:33 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) r2 = perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x80, 0x82, 0x0, 0x2, 0x0, 0xef8, 0x8200, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x8, @perf_bp={&(0x7f0000000480), 0x4}, 0x1a004, 0x1, 0x7, 0xf, 0x6, 0x4, 0x29d, 0x0, 0x7ff, 0x0, 0x7fffffffffffffff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000540)='}#-\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={r0, 0x20, &(0x7f0000000a40)={&(0x7f0000000840)=""/234, 0xea, 0x0, &(0x7f0000000940)=""/194, 0xc2}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000580)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f00000005c0)='syzkaller\x00', 0xff, 0xab, &(0x7f0000000600)=""/171, 0x0, 0x5, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000007c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x4, 0x10, 0x10000}, 0x10, r5, 0x0, 0x0, &(0x7f0000000ac0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x14, 0x1, 0x20, 0x8, 0xb00, r0, 0x4, '\x00', r1, r0, 0x4, 0x3, 0x4}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) (async) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x80, 0x82, 0x0, 0x2, 0x0, 0xef8, 0x8200, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x8, @perf_bp={&(0x7f0000000480), 0x4}, 0x1a004, 0x1, 0x7, 0xf, 0x6, 0x4, 0x29d, 0x0, 0x7ff, 0x0, 0x7fffffffffffffff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xb) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000540)='}#-\x00') (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x58, &(0x7f00000006c0)}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={r0, 0x20, &(0x7f0000000a40)={&(0x7f0000000840)=""/234, 0xea, 0x0, &(0x7f0000000940)=""/194, 0xc2}}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000580)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f00000005c0)='syzkaller\x00', 0xff, 0xab, &(0x7f0000000600)=""/171, 0x0, 0x5, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000007c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x4, 0x10, 0x10000}, 0x10, r5, 0x0, 0x0, &(0x7f0000000ac0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x14, 0x1, 0x20, 0x8, 0xb00, r0, 0x4, '\x00', r1, r0, 0x4, 0x3, 0x4}, 0x48) (async) 23:31:33 executing program 1: socketpair(0x1e, 0x0, 0x3, 0x0) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100189bbb94a960e1878263e6f049a693330bbdb7d81516483455904417f8200573da8b0eec901caf1fc7751ebf7fe2c4de59ecd6c7c202288446c324482319e7e4f1a639789f1cab7d212f94132e2034b62a788df02b80c1441f945fadb6cf325836d3de0a37876d1b3979cb2d504d4af57f75d7c0379004fb423cd22ba809fbecc154d733beb4978ad713e3f0f147a2d4abac99aacb96b1a36c2df6d20058cd4d9663774aa5a533e5"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x2a, 0xe8, 0x1}, 0x20) 23:31:33 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 4: syz_clone(0x40000007, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:33 executing program 1: socketpair(0x1e, 0x0, 0x3, 0x0) 23:31:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100189bbb94a960e1878263e6f049a693330bbdb7d81516483455904417f8200573da8b0eec901caf1fc7751ebf7fe2c4de59ecd6c7c202288446c324482319e7e4f1a639789f1cab7d212f94132e2034b62a788df02b80c1441f945fadb6cf325836d3de0a37876d1b3979cb2d504d4af57f75d7c0379004fb423cd22ba809fbecc154d733beb4978ad713e3f0f147a2d4abac99aacb96b1a36c2df6d20058cd4d9663774aa5a533e5"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100189bbb94a960e1878263e6f049a693330bbdb7d81516483455904417f8200573da8b0eec901caf1fc7751ebf7fe2c4de59ecd6c7c202288446c324482319e7e4f1a639789f1cab7d212f94132e2034b62a788df02b80c1441f945fadb6cf325836d3de0a37876d1b3979cb2d504d4af57f75d7c0379004fb423cd22ba809fbecc154d733beb4978ad713e3f0f147a2d4abac99aacb96b1a36c2df6d20058cd4d9663774aa5a533e5"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async, rerun: 64) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) (async, rerun: 64) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) (async) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x2a, 0xe8, 0x1}, 0x20) 23:31:33 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100189bbb94a960e1878263e6f049a693330bbdb7d81516483455904417f8200573da8b0eec901caf1fc7751ebf7fe2c4de59ecd6c7c202288446c324482319e7e4f1a639789f1cab7d212f94132e2034b62a788df02b80c1441f945fadb6cf325836d3de0a37876d1b3979cb2d504d4af57f75d7c0379004fb423cd22ba809fbecc154d733beb4978ad713e3f0f147a2d4abac99aacb96b1a36c2df6d20058cd4d9663774aa5a533e5"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1004000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 0: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) (async) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='freezer.parent_freezing\x00', 0x0, 0x0) (async) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) (async) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x2a, 0xe8, 0x1}, 0x20) 23:31:33 executing program 4: syz_clone(0x40000008, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 5: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f00020008"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f0000000140)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000040)) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x0, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:33 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 0: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f00000001c0)="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"}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x0, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:33 executing program 5: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f00020008"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f0000000140)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000001c0)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f00020008"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)) (async) openat$cgroup_ro(r0, &(0x7f0000000140)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) (async) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000040)) (async) 23:31:33 executing program 0: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) (rerun: 32) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f00000001c0)="978c9dbad6733460c21f19be7404238c2d8ea499af5c9467ac061220417f2db2afacd7d74fcf7bfc9bb0ee07929798ee48159de3b0f96ee76e72333a899b244be24f78881da19214748aacb833fd9537c2ee06eabbc27aa811025230fc4ee7b7133617a2435f99d5529171302b56297d54143c5a8433912259296be31a54059d5487379b02fb80c6cd967ea2c6b0bdcf9f36b593fd16885fc920588c4e154d43895e304e4ff75f422d873bfd2b19c6f6bb4a251142f6c12179776a57850ec843c3a25a754a9072045bc1cbccf808a8f28dddadfbe81e5d5348271b8a8bea3784c7d43a21853640203db6e0c107943c6483fa00cee14e734a2d1f7cb4e411d307b8e974acb43f60a5b394860c3aea0f8763545824aa78b3a34a123c5c13c9008bd298b5fc99d48bdda652a679413a993ed2420c31b742418806183530d0e8c716cc1f1db51d936c8cd300c055afe8ffdca5708bc9d0f12649743ecad54020fefec2c6e904f0a18e581ace4b83e4bf616ed8823d201833e0668fa085ba17b4b55b37fcdf623b5d288d9668f72bbb2f7c24a77528f0c1802642d5896ffb8df33273942c4b394f7616657aeca3f116f7bd94e971709abf2f81fbf686481124e95be32d4e49ecefc89ef17272b5f410a1eb92461a8846653fa3af7bf5a036d4c4d169606ea6e3c01740504d18b68b6e05c036eee1b3e495213086a84b0d83daab923bdda4114f877f1f8e289a109fad4b0233d5e80fd239cafc356adb74b0636fce0cb9184200aa23625b6e1123165dd6596967e4a3f4cee4dd38b71294140f70d025990d6b70d19ece49f69578b731218ff41d305f00599237da9641c0133b99bd9669432a613d0452e8688dfd3ed963ac2c8c6660986184093a5f2def8d031171111ab05a8cf0942f7b177da71851b0a3fe71d5e0905ba94596ffcaa280c6df7a5e7320fe459154959acd8142a2f9232bf4629a1707fcc91e2868cc1d9f40fdaed0ca0013b3f95805d48d67b773684e67aff769a9ce2081ebf81bde56cf49153e3f1a7eb68a42e6057145f99766e79193709f1601a3f948770a71a5a404a0bc4849941f2f03dcf5645d0de449389ca0a24d8603b5544649a1980592f195ae758fc5d62f5d5963accf57f736a86db90c615be966132b1e0777aa83899bae00955b203da205292a0e041bef97d39ca94cd4541f9adb4dbe44e9fb68724a5cc9042947de92dd1440b938ea6e1c4dfafd4b2121ebc267d4d9f1a89cfba4e91007daef7fc44263f96ced62af8c06a730c89d4f445326e211cf311d36944cae770019c7701e8e8afd24c8361996c0205269c6bc20cefeeacf37b89d09d9975782c3f721eebb4b9f08a88a2239f7b450015fa16c875207212ce7d9bf94741221cf281ea99eacd7cbe42c480e8260120a11ffc53ae6b5436e780b6928dafbb5f4245a1905289deb50511a10aef1f71497bafc5d5032ba04b9ee325df05ae456f56d21f784cf9ccff0a41ce53b140bba8701369908d5df5e76c399075c4a4d976c7c328a76c1c98f4ad3435f58c4c239140ab3c1cb4901f1869b4a5b94ac66fc1aad483b88b1f831ea63cdded311957812f7a8cb38fe30ee6516de3cefa2c6e3cdb069cc57db392ec212f83c4d16ad1ebb47e761435763683632de492519c1211ab6a098c3e951be97b3af9d7a13cb0d03df99900de5a07d8ee3905ba2cc5a57d35bec275d2563f96027d489a10696d6d630e66f24ad551ce3018db2c58266e6425412d1b38638ad9411c11655d6121c2a737fcb1c1a738c68268e71de0d4c0393d1f17a23ae06b48800cca004f55c3d58ee48850e67c3b4f24c1b393916bd14b4d8b8ab2e1a33ceb8b34738317ec19bca5dbb89a77c39469e102507dd56f3618ad01775d9225496e9b9a99e79a243e4fd540ec5fa16d7cb33441cba6ac96a673db5c6fc0a5f6931f46390afb8a290af35b64eea890eb4ae8531ad6f77d9a4860ec16d37900f2e8e47c8c3ae94e6d86e5087bdcb2840424c5ae11a6fe6d0a049cdbbdc428281fa69916140e26415b194bdc30374ede3842d0c56f89899e2861669cde4c2d7eb777d91ce9dc84610e9a752d1a60d4849e7cacd3a197c259cab80e6de0bd6efe9f0b81650eef06151880d160af2621606ac1abe6343de4dea22c1942b8c473b3ba8fe8a8cefc48a75cd6d55fd98ad9af2adf083c0b96aaadd8db3c01be66974cab362bd9bd73e7230cb0e15147a2432812155fa9f8d06cda690e36af27c64275454052aca58338a3e69fd738995515b8f65c30ef522d27874573809586d14ed9701271d4e54caab61de02213913162fc564222027c081099df8861d57aed3ba25dea553a116e88382932b88445a750d706da552e0d01ff8e17e45eb8211338cf2d08c209d407234a909b553817ca78c84728104dcbcd58fcb11cc4206fe8b26e5146e91d934cbaa2f5a990d11981dc108d9dc94700b8d6b0df3b758bc9dfde98178aaddc6766692d3ba66c7cd3f4e2e535127ebf49a14092373a2c4b6a3b54c68c544cd6d01bdf218f726a12dbb992cdbb837e21be79191e5cda0c84124f5d3fdeb0d1858495a7040b364e4a78b0a17c9e697644a4d9cc0d9160d6228e52daa6b2eb666bbb6e2dddfc3bb57eabd987f9be0bc2cb93c3741d741fcce6403b9ff6143eec3da9626c7d5b2b02751dd7b7cb14cf47338878ee1697693dbdae5413062931cd6675ff2ffcb39c2e4d8e0564ff46b7cb578a9f43f76e41efb9fba34986106575efb7f49c23cc67c99fa480c4964bd04d03c57aa3c9f10476a1a7d8707f5b567e4958b7578207b468391f1879adb93999f3f48aba44eb6685a7a48292cef9621a5581e9f74447b443e1587c63e2bced28bf7355d36321c8722a310c1d028bce3892cd7ff29bbb83166c82b9098d096d19ac5069ba0782f61f385f09385a35949057fe32ea27b8d1f726e4f6c3fbbc8b94731d46ff61cc09a42ef7e7bf30782fce7523aafed49e72d17558bfb335785ec19a99a03cc00a057e6e331f9d328996b481b7ec7ad0e4496fa66119eabac52c7ae7d454003558873cc0dba51452f1309904b76fabeac788ca755ff17c252b78ebc636e2d9990aea3b5603d07aaa3f996470eac3332a97457a891f116c3fd24144d80cdf8be1975cfd4070f36a44b8bda522507030c1ba232817e31ad4c6b18d68ea517951270a7999e3264acad7880e63bb527cc2e387a3eadb5f056999a94e80275771780f28a67c6504914b80fb8ee70cc6a6a063fe770099e4b9c4643aac1c0450266cb3b87fa3764535176ac3f27aace91b1cafa123c728ca2b19b5f80edba100d4f3b9532e6dc0f6c38eeb765a57fbe976743b0828868823dacce452f6df0826744d261ecace4ba0ad763f89c535a1b678c1cc4264185a17d5ed58c5f7b8630ac0fac7aaf0cd81e5ce59c96ba6a1ff8d7b581b7ba6c1b5718d11b2cc67854dee737d4d5b9dab48d82aa83f0081e4a72454c0d5c4b068e73f9bda38b60254f8346ee0b73a642bcac4bf17807ece8efe4a795cd70ca9c21b2828be7f140ff13d9b3e96d82ae7d0d66bf610fe088ee3eee9817604b338c717e88b4a019f5355fe4a96743135776de68e988b79ff1f3e482be3954476e23620f5c92787613882bc876a6091787528b86255392fbaa8e564cbb7a8747820a8c28ecee2c0a45de66f37a350080636cb7bbb5cfa132812545d9b08193b7da70fb64d6ab64bc8af19db41bcd996038a42b78440ed58b29b899c88190ff8a9252740f4ba2a8faca361861b607054b251ac7763403012ed665fb6a5e4e8b399a217b278b9ba0644f029cf468cdd14251fc5c99d20cd99d28aecb8e8dd581bb03d12f3f89b60208dd22c8e476124cadb432e9c06ccde53cf7a841ce4af3fd4f0aa0a9ce4af69ecacf9b653424abeb56e496aadc04c8bbfbfad04b8ad47295e50e56d20c7e82b4c76e4451ad1c31a70fefe8ecaf86335899af3c440c18dc10b76aff07d07ead86dbb43f73b27a7c53ca17422a714501dd045065ae33cb83c2ab4908d0bc3472beaad239336ee1ceea2ee0203cf1d49967adf080948ec0a96e7abf1121a7114e69351b849abdf031731d1ea1c045788eba1cabfabd071e220d81d0414377158a517f4ce9fe9b2e4ccc8785c9b7c861c14fe7217505aa128002178898a66a27d063811c907608b999e4bd1f7731e75f7a53060acfc0335bab7e54caba7f9946a151090a193032d25f366d68e78c3a17edaf9e5b373d2f7192d672ef3ad4671e425944b87dd9eddef76eac5ce2be05b3e68d5835ef933ceaa662a5c3ffedc2ae1ff482734eaf32c1a8484fc0c3e355b60173bce6b8b797f9298ef3157e5be66c29beb8bfffc08afa234fb6fa27ab53c1f6b572c3a4231b4847ed1d6738f5adfd2df21e04643f611c38057129566e901e445347991028cb85411a1eba529ec5a574b25ce350653ef603bcc5f19e790b30c8ee5b29ff0658f74578e24180b01dd7f104cda5d7c234ae283994d45cc869caa886fb0ea335b916b6944e9111f2a3b68ecb94c5886980e0130165843f545c39c902e4a6626926894d50be2e1bdb0792c337ddf7a783dc01f50bb7f8f632c4a81c2c7ac1a4e2b2c3d2e9c8c0dcf7d7dcbfe779d47499f43676defc8db7b0096a1f7030a9b3e8383c693109ced7094aa1534bdd5ad1e3fc0abce8b4a21f99c0ce88bc1d303fdd3c0742644b20ef036d0bb80950dfae9d2daa45d64325ff3ec8b45166b66100cd0b7ef7735a56a3f5f64a5fc0840e28d848c6349ed1b41115f975b828edee4fee14d4b21e14c7fb63ec12d20bc18beabd44fd2c510a06a70124f8fd0e6299275d7e1a06bb27c5f96ef7b9b7a4a39a9cb281d54b0f8f256cf2f61eb5f65533530a8eb770d4839da518fcdb895258354111178800e5746ece02c63d1d3bbc155a1729294e8ec177a5e766aaa3ff1e6941205a57fd6b6f5fef6053964ce0e2d8b4afa2fe0e77dcf93c6d484ff99c7964c03f10ff8f596e9177a559992ba709eeda1eac74398e66943422d8d9cda18dc01fbca2d12126518000be69c4f55a56ad1a043ea88910b26e22b9e0621f91c6376071b09b3db0cd33ac291a5abb5765881dde0ec081b8c67dfa665c0a0d961e343aeeab02eda4cf3c15a9a8ddd7b7f674a264c3ee28d961d1a1d3c3186a3a9c3b9d82b0bd1c01ded7ab5119ee868ff27a4382b66d8b206688618e6d4eb7b6ce6259b258a26abdb54e704c30ee6e2a6747beb7fbc9c26976c81a19ef2311d3fbb973b527c6bde1fdda0b3536402fd0eb695d0d9659a21fa0c60c93a83bf07a1e0d7b980d2ce6147f60f0b1182f99fe281e709a189fd0e0adf0100c38459a1a85ba9ae95dcb38a34b39c2a537f0d6f5aa1c9a7a55c793ddeb80831b5be765c06c92575affbf769e12a6e8905ca1dcb248f0294646f022e0546d5b08512dfbd251fe30f70534b34009a9a1e661fc8f9a526a19123582850670aa2a8406da41342cda211115849e7d457e2e03d07c7a3d3fd21c732b1534f673a7465f4bfc28b512c7579e6f7fd6dc7c806a62a14bd4876bdb19da89f2226821cdda185dd2f8d66ea117702cfb44ce4665c62942bfb46d17ce3064304f15c414594367968faef3388f1f067e2f67941d87de138fa84cfec24ba88789d9e4d2a9f83df848094cf05cd627a10ac3aaac2547c8318ba64a5213466af9b214e80dd978cee86acfd33c99c5d0f26f63af600519e2072bed3cef4dd8c528a0ce9fbc41f151bf81c0432f2aeb2eb10256ac074cb9834a58792321d6"}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 4: syz_clone(0x40000009, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:33 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x0, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 5: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000001c0)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f00020008"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f0000000140)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) (rerun: 32) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000040)) 23:31:33 executing program 0: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f00000001c0)="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"}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f00000001c0)="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"}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:33 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000003380), 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 5: ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000180)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000001c0)=0x1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)={'veth1_to_hsr\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010008"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/145, 0x19, 0x8d, 0x1}, 0x20) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 4: syz_clone(0x40000010, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:33 executing program 5: ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000180)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000001c0)=0x1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)={'veth1_to_hsr\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010008"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000180)) (async) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) (async) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000001c0)=0x1) (async) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)={'veth1_to_hsr\x00'}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010008"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/145, 0x19, 0x8d, 0x1}, 0x20) 23:31:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/145, 0x19, 0x8d, 0x1}, 0x20) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:33 executing program 5: ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000180)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r0}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r1}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r1, r1]}, 0x80) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000001c0)=0x1) (async, rerun: 64) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)={'veth1_to_hsr\x00'}) (rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010008"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) 23:31:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:34 executing program 4: syz_clone(0x40000011, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}, {0x0, [0x30, 0x30, 0x30]}}, &(0x7f00000002c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 23:31:34 executing program 0: openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f0000001700)=ANY=[@ANYBLOB="180000000000010000000000000800000000000000fbffffff019680006200000085000000630000009500000000000000e8cb6ed5659f7fd93a2edd2a1d877639cda81db59ebf4441a29de495c5ea88445d385c6a4d8708ceb64cfc9cf89543a2ea1c4dab116771a8ddecf93271c05a1719e535cbda91592c0984d78ef5673f6dc5709f20340f50394223984fc7bec8e7e0eec28234d6f43c"], &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r0, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) openat$cgroup_freezer_state(r4, &(0x7f00000018c0), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) openat$cgroup_ro(r0, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r0, 0x3, '\x00', r1, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000003380), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001240)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r7 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000001600)={0x3, 0x80, 0xf6, 0xb6, 0x44, 0x81, 0x0, 0x6, 0x34000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x6, 0x400}, 0x1815, 0x7, 0x4, 0x3, 0xefc8, 0x3, 0x3ff, 0x0, 0x80000000, 0x0, 0x8001}, 0x0, 0x8, r7, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000001680)={0x1, 0x80, 0x3, 0x30, 0x1f, 0x1, 0x0, 0x200, 0x0, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x2}, 0x80, 0x1, 0x7, 0xb, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}) openat$cgroup_netprio_ifpriomap(r7, &(0x7f0000003380), 0x2, 0x0) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r9, &(0x7f0000003380), 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000017c0)={0x9}, 0x8) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000001280), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0xd, 0x2, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0xa, 0x3, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x2c, 0x1000, &(0x7f00000001c0)=""/4096, 0x40f00, 0x8, '\x00', r1, 0x12, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000001200)={0x3, 0x6, 0x8, 0x8}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f00000012c0)=[r6, r7, 0xffffffffffffffff, r9, r10]}, 0x80) r11 = openat$cgroup_pressure(r7, &(0x7f0000001840)='io.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r11, &(0x7f0000001880)={'full', 0x20, 0x101, 0x20, 0x8000000000000001}, 0x2f) 23:31:34 executing program 5: ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x280000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f02426c18"], &(0x7f00000001c0)=""/148, 0x5c, 0x94, 0x1}, 0x20) 23:31:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}, {0x0, [0x30, 0x30]}}, &(0x7f00000002c0)=""/232, 0x34, 0xe8, 0x1}, 0x20) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:34 executing program 5: ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x280000, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f02426c18"], &(0x7f00000001c0)=""/148, 0x5c, 0x94, 0x1}, 0x20) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 0: openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f0000001700)=ANY=[@ANYBLOB="180000000000010000000000000800000000000000fbffffff019680006200000085000000630000009500000000000000e8cb6ed5659f7fd93a2edd2a1d877639cda81db59ebf4441a29de495c5ea88445d385c6a4d8708ceb64cfc9cf89543a2ea1c4dab116771a8ddecf93271c05a1719e535cbda91592c0984d78ef5673f6dc5709f20340f50394223984fc7bec8e7e0eec28234d6f43c"], &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) (async) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r0, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) (async) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) openat$cgroup_freezer_state(r4, &(0x7f00000018c0), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) (async) openat$cgroup_ro(r0, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r0, 0x3, '\x00', r1, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) (async) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000003380), 0x2, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001240)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) r7 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000001600)={0x3, 0x80, 0xf6, 0xb6, 0x44, 0x81, 0x0, 0x6, 0x34000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x6, 0x400}, 0x1815, 0x7, 0x4, 0x3, 0xefc8, 0x3, 0x3ff, 0x0, 0x80000000, 0x0, 0x8001}, 0x0, 0x8, r7, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000001680)={0x1, 0x80, 0x3, 0x30, 0x1f, 0x1, 0x0, 0x200, 0x0, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x2}, 0x80, 0x1, 0x7, 0xb, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}) (async) openat$cgroup_netprio_ifpriomap(r7, &(0x7f0000003380), 0x2, 0x0) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r9, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000017c0)={0x9}, 0x8) (async) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000001280), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0xd, 0x2, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0xa, 0x3, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x2c, 0x1000, &(0x7f00000001c0)=""/4096, 0x40f00, 0x8, '\x00', r1, 0x12, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000001200)={0x3, 0x6, 0x8, 0x8}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f00000012c0)=[r6, r7, 0xffffffffffffffff, r9, r10]}, 0x80) (async) r11 = openat$cgroup_pressure(r7, &(0x7f0000001840)='io.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r11, &(0x7f0000001880)={'full', 0x20, 0x101, 0x20, 0x8000000000000001}, 0x2f) 23:31:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}, {0x0, [0x30]}}, &(0x7f00000002c0)=""/232, 0x33, 0xe8, 0x1}, 0x20) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:34 executing program 4: syz_clone(0x40000700, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 5: ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x280000, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f02426c18"], &(0x7f00000001c0)=""/148, 0x5c, 0x94, 0x1}, 0x20) 23:31:34 executing program 0: openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001200), 0x8) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001280)={0x4, &(0x7f0000001240)=[{0x6, 0x0, 0x3, 0x2}, {0xffff, 0x35, 0x80, 0x7}, {0x312, 0x6, 0x81, 0x40}, {0x401, 0x3, 0x5, 0x9}]}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x58, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x7, &(0x7f0000001700)=ANY=[@ANYBLOB="180000000000010000000000000800000000000000fbffffff019680006200000085000000630000009500000000000000e8cb6ed5659f7fd93a2edd2a1d877639cda81db59ebf4441a29de495c5ea88445d385c6a4d8708ceb64cfc9cf89543a2ea1c4dab116771a8ddecf93271c05a1719e535cbda91592c0984d78ef5673f6dc5709f20340f50394223984fc7bec8e7e0eec28234d6f43c"], &(0x7f0000001300)='syzkaller\x00', 0x1, 0xb, &(0x7f0000001340)=""/11, 0x39ee0bc9330b4948, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x9, 0x9dd3, 0x48}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b80)={r0, 0xe0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000002980)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000029c0), &(0x7f0000002a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002a40)}}, 0x10) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) openat$cgroup_freezer_state(r4, &(0x7f00000018c0), 0x2, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2, 0xd07}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r3, r3]}, 0x80) (async) openat$cgroup_ro(r0, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)=@bloom_filter={0x1e, 0xffffffff, 0x4, 0xffffffff, 0x1800, r0, 0x3, '\x00', r1, 0xffffffffffffffff, 0x3, 0x5, 0x1f4, 0xe}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000003380), 0x2, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001240)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) r7 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000001600)={0x3, 0x80, 0xf6, 0xb6, 0x44, 0x81, 0x0, 0x6, 0x34000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x6, 0x400}, 0x1815, 0x7, 0x4, 0x3, 0xefc8, 0x3, 0x3ff, 0x0, 0x80000000, 0x0, 0x8001}, 0x0, 0x8, r7, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000001680)={0x1, 0x80, 0x3, 0x30, 0x1f, 0x1, 0x0, 0x200, 0x0, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x2}, 0x80, 0x1, 0x7, 0xb, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}) (async) openat$cgroup_netprio_ifpriomap(r7, &(0x7f0000003380), 0x2, 0x0) (async) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r9, &(0x7f0000003380), 0x2, 0x0) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000017c0)={0x9}, 0x8) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000001280), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0xd, 0x2, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0xa, 0x3, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x2c, 0x1000, &(0x7f00000001c0)=""/4096, 0x40f00, 0x8, '\x00', r1, 0x12, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000001200)={0x3, 0x6, 0x8, 0x8}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f00000012c0)=[r6, r7, 0xffffffffffffffff, r9, r10]}, 0x80) (async) r11 = openat$cgroup_pressure(r7, &(0x7f0000001840)='io.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r11, &(0x7f0000001880)={'full', 0x20, 0x101, 0x20, 0x8000000000000001}, 0x2f) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:31:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8, 0x1}, 0x20) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9e, 0x9e, 0x3, [@func={0xb, 0x0, 0x0, 0xc, 0x1}, @datasec={0xc, 0x1, 0x0, 0xf, 0x3, [{0x1, 0x9, 0x81}], "15b574"}, @datasec={0x1, 0x1, 0x0, 0xf, 0x1, [{0x2, 0x6, 0x4}], "03"}, @struct={0x1, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x0, 0x4}]}, @var={0x8, 0x0, 0x0, 0xe, 0x5, 0x1}, @datasec={0x9, 0x0, 0x0, 0xf, 0x2, [], "6b12"}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7, 0x2}, {}]}, @const={0x10, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000000)=""/79, 0xbb, 0x4f}, 0x20) 23:31:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010038"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 23:31:34 executing program 4: syz_clone(0x40000900, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010038"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000010000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9e, 0x9e, 0x3, [@func={0xb, 0x0, 0x0, 0xc, 0x1}, @datasec={0xc, 0x1, 0x0, 0xf, 0x3, [{0x1, 0x9, 0x81}], "15b574"}, @datasec={0x1, 0x1, 0x0, 0xf, 0x1, [{0x2, 0x6, 0x4}], "03"}, @struct={0x1, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x0, 0x4}]}, @var={0x8, 0x0, 0x0, 0xe, 0x5, 0x1}, @datasec={0x9, 0x0, 0x0, 0xf, 0x2, [], "6b12"}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7, 0x2}, {}]}, @const={0x10, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000000)=""/79, 0xbb, 0x4f}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9e, 0x9e, 0x3, [@func={0xb, 0x0, 0x0, 0xc, 0x1}, @datasec={0xc, 0x1, 0x0, 0xf, 0x3, [{0x1, 0x9, 0x81}], "15b574"}, @datasec={0x1, 0x1, 0x0, 0xf, 0x1, [{0x2, 0x6, 0x4}], "03"}, @struct={0x1, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x0, 0x4}]}, @var={0x8, 0x0, 0x0, 0xe, 0x5, 0x1}, @datasec={0x9, 0x0, 0x0, 0xf, 0x2, [], "6b12"}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7, 0x2}, {}]}, @const={0x10, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000000)=""/79, 0xbb, 0x4f}, 0x20) (async) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000002c0)=""/232, 0x0, 0xe8, 0x1}, 0x20) 23:31:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 23:31:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010038"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010038"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) (async) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000100000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9e, 0x9e, 0x3, [@func={0xb, 0x0, 0x0, 0xc, 0x1}, @datasec={0xc, 0x1, 0x0, 0xf, 0x3, [{0x1, 0x9, 0x81}], "15b574"}, @datasec={0x1, 0x1, 0x0, 0xf, 0x1, [{0x2, 0x6, 0x4}], "03"}, @struct={0x1, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x0, 0x4}]}, @var={0x8, 0x0, 0x0, 0xe, 0x5, 0x1}, @datasec={0x9, 0x0, 0x0, 0xf, 0x2, [], "6b12"}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7, 0x2}, {}]}, @const={0x10, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000000)=""/79, 0xbb, 0x4f}, 0x20) 23:31:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) recvmsg$unix(r2, &(0x7f0000001300)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000240)=""/103, 0x67}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x2, &(0x7f00000012c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x40002000) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8, 0x5, 0x2a93a2bd, 0x5, 0x400, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x5, 0x5, 0x4}, 0x48) 23:31:34 executing program 4: syz_clone(0x40001100, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 23:31:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8}, 0x20) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) recvmsg$unix(r2, &(0x7f0000001300)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000240)=""/103, 0x67}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x2, &(0x7f00000012c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x40002000) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8, 0x5, 0x2a93a2bd, 0x5, 0x400, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x5, 0x5, 0x4}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) (async) recvmsg$unix(r2, &(0x7f0000001300)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000240)=""/103, 0x67}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x2, &(0x7f00000012c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x40002000) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8, 0x5, 0x2a93a2bd, 0x5, 0x400, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x5, 0x5, 0x4}, 0x48) (async) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x1e, 0xe8, 0x1}, 0x20) 23:31:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x2a, 0xe8, 0x1}, 0x20) 23:31:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8}, 0x20) 23:31:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async) 23:31:34 executing program 4: syz_clone(0x40001f00, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x300000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r1}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r2}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x13, &(0x7f0000002c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @jmp={0x5, 0x1, 0x8, 0x9, 0x0, 0x10}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[r2, r2]}, 0x80) recvmsg$unix(r2, &(0x7f0000001300)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000240)=""/103, 0x67}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x2, &(0x7f00000012c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x40002000) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000003380), 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8, 0x5, 0x2a93a2bd, 0x5, 0x400, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x5, 0x5, 0x4}, 0x48) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x2a, 0xe8, 0x1}, 0x20) 23:31:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x18b880, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0xf) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000280)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xff, 0x2, 0x8, 0xff, 0x0, 0x4, 0x20400, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140)}, 0x2, 0xe956, 0x400, 0x4, 0x5, 0x2, 0x7, 0x0, 0x43, 0x0, 0x100000001}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xb) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="8feb01908122640412d650300bdc71e70118849c52006f59d86cae8f7e0c6c1ad46120d1609004783af88e51359d37d4c3a6a6146ce04340e5ccb460ddbebf0243d465a1674de4473146fc328bbe547a7fcd7faae8370e4097213d3116e2182baebd909f5e8d35160a7abebef0fb247f4b58c50ebe5ca33e7eb2bcd5b39431821f8be49d4082040622e605b8da82", @ANYRES32=r1, @ANYRESHEX=r1], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 23:31:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x8}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8}, 0x20) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x20, &(0x7f0000000000)={&(0x7f00000001c0)=""/183, 0xb7, 0x0, &(0x7f0000000280)=""/140, 0x8c}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001400)={r0, 0x20, &(0x7f0000000140)={&(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000001340)=""/134, 0x86}}, 0x10) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x8000, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000016c0)=@bpf_lsm={0x1d, 0xb, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@alu={0x7, 0x1, 0xd, 0xe, 0x1, 0x10, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0xb, 0x8, 0x4, 0xffffffffffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x1c}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0x7, 0x3, 0x0, 0xffffffffffffffdc, 0xfffffffffffffff0}]}, &(0x7f00000014c0)='GPL\x00', 0xffffff81, 0x8d, &(0x7f0000001500)=""/141, 0x40f00, 0x16, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f00000015c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001600)={0x3, 0x3, 0x8000, 0x80000000}, 0x10, r1, 0x0, 0x0, &(0x7f0000001680)=[r3, r4, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x2a, 0xe8, 0x1}, 0x20) 23:31:34 executing program 4: syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 2: syz_clone(0x40001100, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x500000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x18b880, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0xf) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000280)) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xff, 0x2, 0x8, 0xff, 0x0, 0x4, 0x20400, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140)}, 0x2, 0xe956, 0x400, 0x4, 0x5, 0x2, 0x7, 0x0, 0x43, 0x0, 0x100000001}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xb) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="8feb01908122640412d650300bdc71e70118849c52006f59d86cae8f7e0c6c1ad46120d1609004783af88e51359d37d4c3a6a6146ce04340e5ccb460ddbebf0243d465a1674de4473146fc328bbe547a7fcd7faae8370e4097213d3116e2182baebd909f5e8d35160a7abebef0fb247f4b58c50ebe5ca33e7eb2bcd5b39431821f8be49d4082040622e605b8da82", @ANYRES32=r1, @ANYRESHEX=r1], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x600000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x20, &(0x7f0000000000)={&(0x7f00000001c0)=""/183, 0xb7, 0x0, &(0x7f0000000280)=""/140, 0x8c}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001400)={r0, 0x20, &(0x7f0000000140)={&(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000001340)=""/134, 0x86}}, 0x10) (async) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) (async, rerun: 32) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (rerun: 32) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) (async) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x8000, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000016c0)=@bpf_lsm={0x1d, 0xb, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@alu={0x7, 0x1, 0xd, 0xe, 0x1, 0x10, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0xb, 0x8, 0x4, 0xffffffffffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x1c}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0x7, 0x3, 0x0, 0xffffffffffffffdc, 0xfffffffffffffff0}]}, &(0x7f00000014c0)='GPL\x00', 0xffffff81, 0x8d, &(0x7f0000001500)=""/141, 0x40f00, 0x16, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f00000015c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001600)={0x3, 0x3, 0x8000, 0x80000000}, 0x10, r1, 0x0, 0x0, &(0x7f0000001680)=[r3, r4, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x18b880, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0xf) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000280)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xff, 0x2, 0x8, 0xff, 0x0, 0x4, 0x20400, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140)}, 0x2, 0xe956, 0x400, 0x4, 0x5, 0x2, 0x7, 0x0, 0x43, 0x0, 0x100000001}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xb) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="8feb01908122640412d650300bdc71e70118849c52006f59d86cae8f7e0c6c1ad46120d1609004783af88e51359d37d4c3a6a6146ce04340e5ccb460ddbebf0243d465a1674de4473146fc328bbe547a7fcd7faae8370e4097213d3116e2182baebd909f5e8d35160a7abebef0fb247f4b58c50ebe5ca33e7eb2bcd5b39431821f8be49d4082040622e605b8da82", @ANYRES32=r1, @ANYRESHEX=r1], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:34 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x20, &(0x7f0000000000)={&(0x7f00000001c0)=""/183, 0xb7, 0x0, &(0x7f0000000280)=""/140, 0x8c}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001400)={r0, 0x20, &(0x7f0000000140)={&(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000001340)=""/134, 0x86}}, 0x10) (async) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000003380), 0x2, 0x0) (async) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003380), 0x2, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x8000, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000016c0)=@bpf_lsm={0x1d, 0xb, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@alu={0x7, 0x1, 0xd, 0xe, 0x1, 0x10, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0xb, 0x8, 0x4, 0xffffffffffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x1c}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0x7, 0x3, 0x0, 0xffffffffffffffdc, 0xfffffffffffffff0}]}, &(0x7f00000014c0)='GPL\x00', 0xffffff81, 0x8d, &(0x7f0000001500)=""/141, 0x40f00, 0x16, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f00000015c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001600)={0x3, 0x3, 0x8000, 0x80000000}, 0x10, r1, 0x0, 0x0, &(0x7f0000001680)=[r3, r4, 0x1, 0xffffffffffffffff]}, 0x80) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x700000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/41, 0x29, 0x0, &(0x7f00000001c0)=""/100, 0x64}}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x7, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x14, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x7}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)}, 0x80) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r3, 0x4) openat$cgroup_type(r3, &(0x7f00000002c0), 0x2, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) 23:31:34 executing program 4: syz_clone(0x40000000, 0x0, 0x2, 0x0, 0x0, 0x0) 23:31:34 executing program 2: syz_clone(0x40001100, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x30, 0x30, 0x30, 0x5f]}}, &(0x7f00000002c0)=""/232, 0x36, 0xe8, 0x1}, 0x20) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/145, 0x5c, 0x91, 0x1}, 0x20) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000200)='FREEZING\x00', 0x9) 23:31:34 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/41, 0x29, 0x0, &(0x7f00000001c0)=""/100, 0x64}}, 0x10) (async, rerun: 64) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) (rerun: 64) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x7, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 64) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) (async, rerun: 64) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r4}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x14, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x7}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)}, 0x80) (async, rerun: 32) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r3, 0x4) (async, rerun: 32) openat$cgroup_type(r3, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x30, 0x30, 0x30]}}, &(0x7f00000002c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/145, 0x5c, 0x91, 0x1}, 0x20) (async) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) (async) r1 = openat$cgroup_freezer_state(r0, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000200)='FREEZING\x00', 0x9) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x30, 0x30]}}, &(0x7f00000002c0)=""/232, 0x34, 0xe8, 0x1}, 0x20) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/145, 0x5c, 0x91, 0x1}, 0x20) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000200)='FREEZING\x00', 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/145, 0x5c, 0x91, 0x1}, 0x20) (async) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) (async) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) (async) openat$cgroup_freezer_state(r0, &(0x7f00000001c0), 0x2, 0x0) (async) write$cgroup_freezer_state(r1, &(0x7f0000000200)='FREEZING\x00', 0x9) (async) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 2: syz_clone(0x40001100, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 4: syz_clone(0x40000000, 0x0, 0x7, 0x0, 0x0, 0x0) 23:31:34 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/41, 0x29, 0x0, &(0x7f00000001c0)=""/100, 0x64}}, 0x10) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) (async) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001580), 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0)={r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x7, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 32) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001800)={0xffffffffffffffff, r3}, 0xc) (async, rerun: 32) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000003380), 0x2, 0x0) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002e40)={0x11, 0x14, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x10000}, [@generic={0x2d, 0xb, 0x1, 0x81}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x7}, @btf_id={0x18, 0xa}, @btf_id={0x18, 0x5}, @map_fd={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}]}, &(0x7f0000002d40)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000002dc0)={0x5, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e00)}, 0x80) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r3, 0x4) openat$cgroup_type(r3, &(0x7f00000002c0), 0x2, 0x0) (async, rerun: 32) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) (rerun: 32) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}, {0x0, [0x30]}}, &(0x7f00000002c0)=""/232, 0x33, 0xe8, 0x1}, 0x20) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup=r0, 0xffffffffffffffff, 0x14}, 0x10) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8, 0x1}, 0x20) 23:31:34 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x9, 0x40, 0x0, 0x2, 0x0, 0x5, 0xa0004, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x10d96, 0x97, 0x0, 0x0, 0x7, 0x5051, 0xb9, 0x0, 0x32d, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="38a1d7a76ca803005b5e18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0xc, [@struct={0xa, 0x3, 0x0, 0x4, 0x0, 0x2, [{0xb, 0x2, 0xbbfe}, {0xf, 0x1, 0x401}, {0x5, 0x3, 0x8}]}, @struct={0x10, 0x1, 0x0, 0x4, 0x1, 0x3ff, [{0xd, 0x2, 0x401}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}, @fwd={0xc}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x101}}]}, {0x0, [0x2e, 0xda8be6505e3f8759, 0x0, 0x61, 0x5f, 0x5f, 0x5f, 0x61, 0x0, 0x0]}}, &(0x7f0000000280)=""/141, 0x9c, 0x8d, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x4) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup=r0, 0xffffffffffffffff, 0x14}, 0x10) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup=r0, 0xffffffffffffffff, 0x14}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup=r0, 0xffffffffffffffff, 0x14}, 0x10) (async) 23:31:34 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x9, 0x40, 0x0, 0x2, 0x0, 0x5, 0xa0004, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x10d96, 0x97, 0x0, 0x0, 0x7, 0x5051, 0xb9, 0x0, 0x32d, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="38a1d7a76ca803005b5e18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0xc, [@struct={0xa, 0x3, 0x0, 0x4, 0x0, 0x2, [{0xb, 0x2, 0xbbfe}, {0xf, 0x1, 0x401}, {0x5, 0x3, 0x8}]}, @struct={0x10, 0x1, 0x0, 0x4, 0x1, 0x3ff, [{0xd, 0x2, 0x401}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}, @fwd={0xc}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x101}}]}, {0x0, [0x2e, 0xda8be6505e3f8759, 0x0, 0x61, 0x5f, 0x5f, 0x5f, 0x61, 0x0, 0x0]}}, &(0x7f0000000280)=""/141, 0x9c, 0x8d, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x4) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x9, 0x40, 0x0, 0x2, 0x0, 0x5, 0xa0004, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x10d96, 0x97, 0x0, 0x0, 0x7, 0x5051, 0xb9, 0x0, 0x32d, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="38a1d7a76ca803005b5e18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0xc, [@struct={0xa, 0x3, 0x0, 0x4, 0x0, 0x2, [{0xb, 0x2, 0xbbfe}, {0xf, 0x1, 0x401}, {0x5, 0x3, 0x8}]}, @struct={0x10, 0x1, 0x0, 0x4, 0x1, 0x3ff, [{0xd, 0x2, 0x401}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}, @fwd={0xc}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x101}}]}, {0x0, [0x2e, 0xda8be6505e3f8759, 0x0, 0x61, 0x5f, 0x5f, 0x5f, 0x61, 0x0, 0x0]}}, &(0x7f0000000280)=""/141, 0x9c, 0x8d, 0x1}, 0x20) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x4) (async) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 4: syz_clone(0x40000000, 0x0, 0x8, 0x0, 0x0, 0x0) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000100)=""/130, 0x5c, 0x82}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'rose0\x00'}) 23:31:34 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x9, 0x40, 0x0, 0x2, 0x0, 0x5, 0xa0004, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x10d96, 0x97, 0x0, 0x0, 0x7, 0x5051, 0xb9, 0x0, 0x32d, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="38a1d7a76ca803005b5e18"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0xc, [@struct={0xa, 0x3, 0x0, 0x4, 0x0, 0x2, [{0xb, 0x2, 0xbbfe}, {0xf, 0x1, 0x401}, {0x5, 0x3, 0x8}]}, @struct={0x10, 0x1, 0x0, 0x4, 0x1, 0x3ff, [{0xd, 0x2, 0x401}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}, @fwd={0xc}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x101}}]}, {0x0, [0x2e, 0xda8be6505e3f8759, 0x0, 0x61, 0x5f, 0x5f, 0x5f, 0x61, 0x0, 0x0]}}, &(0x7f0000000280)=""/141, 0x9c, 0x8d, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x4) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8}, 0x20) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0xfec8) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000100)=""/130, 0x5c, 0x82}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'rose0\x00'}) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8}, 0x20) 23:31:34 executing program 4: syz_clone(0x40000000, 0x0, 0x9, 0x0, 0x0, 0x0) 23:31:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0xfec8) 23:31:34 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000100)=""/130, 0x5c, 0x82}, 0x20) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'rose0\x00'}) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f00000002c0)=""/232, 0x32, 0xe8}, 0x20) 23:31:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/144, 0x5c, 0x90, 0x1}, 0x20) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 2: syz_clone(0x40000000, 0x0, 0x7, 0x0, 0x0, 0x0) 23:31:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0xfec8) 23:31:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup=r0, 0xffffffffffffffff, 0x14}, 0x10) 23:31:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:31:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f58880000"], &(0x7f0000000080)=""/141, 0x5c, 0x8d, 0x1}, 0x20) [ 761.482481][ T3643] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 761.494033][ T3643] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 761.502280][ T3643] CPU: 0 PID: 3643 Comm: syz-executor.2 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 761.513651][ T3643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 761.523538][ T3643] RIP: 0010:__rb_erase_color+0x208/0xb60 [ 761.529005][ T3643] Code: 00 00 00 00 fc ff df 41 80 3c 07 00 74 08 48 89 df e8 4c e6 2c ff 4c 8b 33 4d 89 f4 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 f7 e8 29 e6 2c ff 41 f6 06 01 48 89 5d [ 761.548444][ T3643] RSP: 0018:ffffc90009477988 EFLAGS: 00010246 [ 761.554344][ T3643] RAX: dffffc0000000000 RBX: ffff888166a173e0 RCX: ffff88815e9d4f00 [ 761.562159][ T3643] RDX: ffffffff81a72020 RSI: ffff888109742658 RDI: ffff888166a173d0 [ 761.569974][ T3643] RBP: ffffc900094779e8 R08: ffffffff81a701b9 R09: ffffed10212e84cf [ 761.577784][ T3643] R10: ffffed10212e84cf R11: 1ffff110212e84ce R12: 0000000000000000 [ 761.585592][ T3643] R13: ffff888166a173d0 R14: 0000000000000000 R15: 1ffff1102cd42e7c [ 761.593409][ T3643] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 761.602170][ T3643] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 761.608591][ T3643] CR2: 00005555563b8728 CR3: 0000000115ba4000 CR4: 00000000003506b0 [ 761.616407][ T3643] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 761.624214][ T3643] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 761.632028][ T3643] Call Trace: [ 761.635151][ T3643] [ 761.637937][ T3643] ? anon_vma_interval_tree_iter_next+0x3b0/0x3b0 [ 761.644177][ T3643] ? __kasan_check_write+0x14/0x20 [ 761.649215][ T3643] ? down_write+0xdd/0x140 [ 761.653469][ T3643] vma_interval_tree_remove+0xa66/0xa80 [ 761.658851][ T3643] unlink_file_vma+0xd9/0xf0 [ 761.663272][ T3643] free_pgtables+0x13b/0x210 [ 761.667698][ T3643] exit_mmap+0x466/0x7a0 [ 761.671785][ T3643] ? exit_aio+0x270/0x3b0 [ 761.675943][ T3643] ? vm_brk+0x30/0x30 [ 761.679762][ T3643] ? mutex_unlock+0xa2/0x110 [ 761.684194][ T3643] ? uprobe_clear_state+0x2c2/0x320 [ 761.689228][ T3643] __mmput+0x95/0x300 [ 761.693044][ T3643] mmput+0x50/0x60 [ 761.696602][ T3643] exit_mm+0x50d/0x760 [ 761.700507][ T3643] ? exit_itimers+0x694/0x6e0 [ 761.705024][ T3643] ? do_exit+0x24d0/0x24d0 [ 761.709273][ T3643] ? taskstats_exit+0x3a0/0xa20 [ 761.713970][ T3643] do_exit+0x63c/0x24d0 [ 761.717954][ T3643] ? __kasan_check_write+0x14/0x20 [ 761.722988][ T3643] ? fpregs_restore_userregs+0x1f0/0x3a0 [ 761.728459][ T3643] ? get_task_struct+0x80/0x80 [ 761.733053][ T3643] ? __x64_sys_clock_nanosleep+0x360/0x3f0 [ 761.738701][ T3643] __x64_sys_exit+0x40/0x40 [ 761.743213][ T3643] do_syscall_64+0x44/0xd0 [ 761.747463][ T3643] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 761.753203][ T3643] RIP: 0033:0x7f44422960a9 [ 761.757443][ T3643] Code: Unable to access opcode bytes at RIP 0x7f444229607f. [ 761.764649][ T3643] RSP: 002b:00007f4441009118 EFLAGS: 00000246 ORIG_RAX: 000000000000003c [ 761.772892][ T3643] RAX: ffffffffffffffda RBX: 00007f44423b5f80 RCX: 00007f44422960a9 [ 761.780705][ T3643] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 761.788612][ T3643] RBP: 00007f44422f1ae9 R08: 0000000000000000 R09: 0000000000000000 [ 761.796428][ T3643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 761.804234][ T3643] R13: 00007ffdb27cc86f R14: 00007f4441009300 R15: 0000000000022000 [ 761.812045][ T3643] [ 761.814905][ T3643] Modules linked in: [ 761.826130][ T3643] ---[ end trace ddae0d93be6c34d8 ]--- [ 761.831542][ T3643] RIP: 0010:__rb_erase_color+0x208/0xb60 [ 761.836973][ T3643] Code: 00 00 00 00 fc ff df 41 80 3c 07 00 74 08 48 89 df e8 4c e6 2c ff 4c 8b 33 4d 89 f4 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 f7 e8 29 e6 2c ff 41 f6 06 01 48 89 5d [ 761.856734][ T3643] RSP: 0018:ffffc90009477988 EFLAGS: 00010246 [ 761.862736][ T3643] RAX: dffffc0000000000 RBX: ffff888166a173e0 RCX: ffff88815e9d4f00 [ 761.870531][ T3643] RDX: ffffffff81a72020 RSI: ffff888109742658 RDI: ffff888166a173d0 [ 761.878243][ T3643] RBP: ffffc900094779e8 R08: ffffffff81a701b9 R09: ffffed10212e84cf [ 761.886093][ T3643] R10: ffffed10212e84cf R11: 1ffff110212e84ce R12: 0000000000000000 [ 761.893903][ T3643] R13: ffff888166a173d0 R14: 0000000000000000 R15: 1ffff1102cd42e7c [ 761.901713][ T3643] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 761.910478][ T3643] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 761.916873][ T3643] CR2: 00005555563b8728 CR3: 00000001003da000 CR4: 00000000003506b0 [ 761.924709][ T3643] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 761.932524][ T3643] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 761.940359][ T3643] Kernel panic - not syncing: Fatal exception [ 761.946347][ T3643] Kernel Offset: disabled [ 761.950489][ T3643] Rebooting in 86400 seconds..