2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xe00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1c00001892000000000000000000a0a70521e402c01824447e006c000095000000000001005a4b4077e3c961ef53dc5fa934a89af9e18556a43a3918ae89562f0cbd5693f3eb6d4493c350f314f406dab73a1599904ff23ac870ff977bbc4ef3cbe2ee6bb2c9514f168b40f6f395ac453fcb42aeb151f1e9875bdc6585709f9936465c84bb4283a4dcdde5efc04ac9a9c01866167815cc3e5a328cbfb8fccc6f1aff6a1a3cb2013076828eec052daa61acdbff853b8dfd3a131549f4427c41f3311b17419972dc22908fe9bdb9a1746a6c1737bc"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1c00001892000000000000000000a0a70521e402c01824447e006c000095000000000001005a4b4077e3c961ef53dc5fa934a89af9e18556a43a3918ae89562f0cbd5693f3eb6d4493c350f314f406dab73a1599904ff23ac870ff977bbc4ef3cbe2ee6bb2c9514f168b40f6f395ac453fcb42aeb151f1e9875bdc6585709f9936465c84bb4283a4dcdde5efc04ac9a9c01866167815cc3e5a328cbfb8fccc6f1aff6a1a3cb2013076828eec052daa61acdbff853b8dfd3a131549f4427c41f3311b17419972dc22908fe9bdb9a1746a6c1737bc"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) 07:41:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x1ac5c8, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000140)=""/39, 0x27}, {&(0x7f0000000280)}, {&(0x7f0000000300)=""/202, 0xca}, {&(0x7f0000000400)=""/99, 0x63}, {&(0x7f0000000480)=""/80, 0x50}], 0x5, &(0x7f0000000180)=""/169, 0xa9}, 0x40000000) 07:41:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000003000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1c00001892000000000000000000a0a70521e402c01824447e006c000095000000000001005a4b4077e3c961ef53dc5fa934a89af9e18556a43a3918ae89562f0cbd5693f3eb6d4493c350f314f406dab73a1599904ff23ac870ff977bbc4ef3cbe2ee6bb2c9514f168b40f6f395ac453fcb42aeb151f1e9875bdc6585709f9936465c84bb4283a4dcdde5efc04ac9a9c01866167815cc3e5a328cbfb8fccc6f1aff6a1a3cb2013076828eec052daa61acdbff853b8dfd3a131549f4427c41f3311b17419972dc22908fe9bdb9a1746a6c1737bc"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1c00001892000000000000000000a0a70521e402c01824447e006c000095000000000001005a4b4077e3c961ef53dc5fa934a89af9e18556a43a3918ae89562f0cbd5693f3eb6d4493c350f314f406dab73a1599904ff23ac870ff977bbc4ef3cbe2ee6bb2c9514f168b40f6f395ac453fcb42aeb151f1e9875bdc6585709f9936465c84bb4283a4dcdde5efc04ac9a9c01866167815cc3e5a328cbfb8fccc6f1aff6a1a3cb2013076828eec052daa61acdbff853b8dfd3a131549f4427c41f3311b17419972dc22908fe9bdb9a1746a6c1737bc"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) 07:41:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000140)=""/39, 0x27}, {&(0x7f0000000280)}, {&(0x7f0000000300)=""/202, 0xca}, {&(0x7f0000000400)=""/99, 0x63}, {&(0x7f0000000480)=""/80, 0x50}], 0x5, &(0x7f0000000180)=""/169, 0xa9}, 0x40000000) 07:41:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000004000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 07:41:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x200000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x1000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) 07:41:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000005000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000580)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={r3, 0x20, &(0x7f0000000780)={&(0x7f0000000600)=""/188, 0xbc, 0x0, &(0x7f00000006c0)=""/148, 0x94}}, 0x10) write$cgroup_pressure(r1, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) close(r2) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/91, 0x5b}, {&(0x7f0000000080)=""/145, 0x91}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000180)=""/127, 0x7f}, {&(0x7f0000000200)=""/63, 0x3f}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/173, 0xad}], 0x8, &(0x7f0000000400)=""/213, 0xd5}, 0x10022) 07:41:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) recvmsg(r0, 0x0, 0x40000000) 07:41:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 07:41:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x1010000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) 07:41:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000006000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) recvmsg(r0, 0x0, 0x0) 07:41:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=ANY=[@ANYBLOB="180800"/24], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x2000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=ANY=[@ANYBLOB="180800"/24], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000080)=""/13) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'geneve0\x00', 0x200}) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x927a700, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000007000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000580)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={r3, 0x20, &(0x7f0000000780)={&(0x7f0000000600)=""/188, 0xbc, 0x0, &(0x7f00000006c0)=""/148, 0x94}}, 0x10) write$cgroup_pressure(r1, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) close(r2) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/91, 0x5b}, {&(0x7f0000000080)=""/145, 0x91}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000180)=""/127, 0x7f}, {&(0x7f0000000200)=""/63, 0x3f}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/173, 0xad}], 0x8, &(0x7f0000000400)=""/213, 0xd5}, 0x10022) 07:41:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) 07:41:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x3000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=ANY=[@ANYBLOB="180800"/24], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:44 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000080)=""/143, 0x8f}, {&(0x7f0000000140)=""/2, 0x2}, {&(0x7f0000000180)=""/37, 0x25}, {&(0x7f00000001c0)=""/210, 0xd2}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000340)=""/196, 0xc4}, {&(0x7f0000000440)=""/159, 0x9f}, {&(0x7f0000000500)=""/135, 0x87}, {&(0x7f00000005c0)=""/120, 0x78}], 0x9}, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000054afb0af466689ff727b009500000000000000bed8a606d9b612ee5275425d2e2fd0a3072bc565e6b103410aa6b2cbfa2f2a780627d8cc01682e3bbb7179cdc3714f03bdfc187cf7b81490a32489a6c412adfe94b0b14fc13bf74d4c99598719f1cae569d4f8394622"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000008000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000580)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={r3, 0x20, &(0x7f0000000780)={&(0x7f0000000600)=""/188, 0xbc, 0x0, &(0x7f00000006c0)=""/148, 0x94}}, 0x10) write$cgroup_pressure(r1, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) close(r2) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/91, 0x5b}, {&(0x7f0000000080)=""/145, 0x91}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000180)=""/127, 0x7f}, {&(0x7f0000000200)=""/63, 0x3f}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/173, 0xad}], 0x8, &(0x7f0000000400)=""/213, 0xd5}, 0x10022) 07:41:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x4000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r0) recvmsg(r1, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) 07:41:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r0) recvmsg(r1, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) 07:41:44 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000080)=""/143, 0x8f}, {&(0x7f0000000140)=""/2, 0x2}, {&(0x7f0000000180)=""/37, 0x25}, {&(0x7f00000001c0)=""/210, 0xd2}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000340)=""/196, 0xc4}, {&(0x7f0000000440)=""/159, 0x9f}, {&(0x7f0000000500)=""/135, 0x87}, {&(0x7f00000005c0)=""/120, 0x78}], 0x9}, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000054afb0af466689ff727b009500000000000000bed8a606d9b612ee5275425d2e2fd0a3072bc565e6b103410aa6b2cbfa2f2a780627d8cc01682e3bbb7179cdc3714f03bdfc187cf7b81490a32489a6c412adfe94b0b14fc13bf74d4c99598719f1cae569d4f8394622"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) recvmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000080)=""/143, 0x8f}, {&(0x7f0000000140)=""/2, 0x2}, {&(0x7f0000000180)=""/37, 0x25}, {&(0x7f00000001c0)=""/210, 0xd2}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000340)=""/196, 0xc4}, {&(0x7f0000000440)=""/159, 0x9f}, {&(0x7f0000000500)=""/135, 0x87}, {&(0x7f00000005c0)=""/120, 0x78}], 0x9}, 0x2) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000054afb0af466689ff727b009500000000000000bed8a606d9b612ee5275425d2e2fd0a3072bc565e6b103410aa6b2cbfa2f2a780627d8cc01682e3bbb7179cdc3714f03bdfc187cf7b81490a32489a6c412adfe94b0b14fc13bf74d4c99598719f1cae569d4f8394622"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) 07:41:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000009000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000080)=""/13) (async, rerun: 64) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'geneve0\x00', 0x200}) (rerun: 64) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async, rerun: 32) syz_clone(0x927a700, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (rerun: 32) 07:41:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x5000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000580)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={r3, 0x20, &(0x7f0000000780)={&(0x7f0000000600)=""/188, 0xbc, 0x0, &(0x7f00000006c0)=""/148, 0x94}}, 0x10) write$cgroup_pressure(r1, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) close(r2) 07:41:44 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000080)=""/143, 0x8f}, {&(0x7f0000000140)=""/2, 0x2}, {&(0x7f0000000180)=""/37, 0x25}, {&(0x7f00000001c0)=""/210, 0xd2}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000340)=""/196, 0xc4}, {&(0x7f0000000440)=""/159, 0x9f}, {&(0x7f0000000500)=""/135, 0x87}, {&(0x7f00000005c0)=""/120, 0x78}], 0x9}, 0x2) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000054afb0af466689ff727b009500000000000000bed8a606d9b612ee5275425d2e2fd0a3072bc565e6b103410aa6b2cbfa2f2a780627d8cc01682e3bbb7179cdc3714f03bdfc187cf7b81490a32489a6c412adfe94b0b14fc13bf74d4c99598719f1cae569d4f8394622"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:44 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000580)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={r2, 0x20, &(0x7f0000000780)={&(0x7f0000000600)=""/188, 0xbc, 0x0, &(0x7f00000006c0)=""/148, 0x94}}, 0x10) write$cgroup_pressure(r1, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000a000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x5010000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r0) recvmsg(r1, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x1) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) 07:41:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000b000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000080)=""/13) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'geneve0\x00', 0x200}) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x927a700, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000080)=""/13) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'geneve0\x00', 0x200}) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x927a700, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) 07:41:44 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000580)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) write$cgroup_pressure(r1, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r0) recvmsg(r1, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x1) 07:41:44 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000580)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) write$cgroup_pressure(r1, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x6000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000c000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="18ecff2700000000000000000000000095000400000000560f2267c7d17a42020000000004c99e1cb52122827ebcfa867d54bd7588390680c46be940a8de2739bd7fe235827e8b65d12c2df78b5efecec20087708e15180dc6a6db0cdba9b6db451fc6255ed0cc17ea332db6cf3ae2bf8105b2f898cf8bd3963242ce75e3db1e4c1b95069d2ef5275cb0ec5998ffb3a4be3d2540ef8a4789cf9824b6a4751d40ec1746"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0xe, &(0x7f0000000000)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x7}, @alu={0x7, 0x1, 0x8, 0x8, 0x0, 0x20, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x71, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xff}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @exit], &(0x7f0000000080)='syzkaller\x00', 0xa540, 0xd6, &(0x7f00000000c0)=""/214, 0x41000, 0x18, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x10, 0x9, 0x7abed388}, 0x10, r1, r0}, 0x80) 07:41:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x7000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:44 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000580)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) write$cgroup_pressure(r1, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:44 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 07:41:44 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="18ecff2700000000000000000000000095000400000000560f2267c7d17a42020000000004c99e1cb52122827ebcfa867d54bd7588390680c46be940a8de2739bd7fe235827e8b65d12c2df78b5efecec20087708e15180dc6a6db0cdba9b6db451fc6255ed0cc17ea332db6cf3ae2bf8105b2f898cf8bd3963242ce75e3db1e4c1b95069d2ef5275cb0ec5998ffb3a4be3d2540ef8a4789cf9824b6a4751d40ec1746"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0xe, &(0x7f0000000000)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x7}, @alu={0x7, 0x1, 0x8, 0x8, 0x0, 0x20, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x71, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xff}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @exit], &(0x7f0000000080)='syzkaller\x00', 0xa540, 0xd6, &(0x7f00000000c0)=""/214, 0x41000, 0x18, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x10, 0x9, 0x7abed388}, 0x10, r1, r0}, 0x80) 07:41:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r0) 07:41:45 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000580)) write$cgroup_pressure(r1, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x8000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) close(r0) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000d000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="18ecff2700000000000000000000000095000400000000560f2267c7d17a42020000000004c99e1cb52122827ebcfa867d54bd7588390680c46be940a8de2739bd7fe235827e8b65d12c2df78b5efecec20087708e15180dc6a6db0cdba9b6db451fc6255ed0cc17ea332db6cf3ae2bf8105b2f898cf8bd3963242ce75e3db1e4c1b95069d2ef5275cb0ec5998ffb3a4be3d2540ef8a4789cf9824b6a4751d40ec1746"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0xe, &(0x7f0000000000)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x7}, @alu={0x7, 0x1, 0x8, 0x8, 0x0, 0x20, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x71, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xff}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @exit], &(0x7f0000000080)='syzkaller\x00', 0xa540, 0xd6, &(0x7f00000000c0)=""/214, 0x41000, 0x18, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x10, 0x9, 0x7abed388}, 0x10, r1, r0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="18ecff2700000000000000000000000095000400000000560f2267c7d17a42020000000004c99e1cb52122827ebcfa867d54bd7588390680c46be940a8de2739bd7fe235827e8b65d12c2df78b5efecec20087708e15180dc6a6db0cdba9b6db451fc6255ed0cc17ea332db6cf3ae2bf8105b2f898cf8bd3963242ce75e3db1e4c1b95069d2ef5275cb0ec5998ffb3a4be3d2540ef8a4789cf9824b6a4751d40ec1746"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0xe, &(0x7f0000000000)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x7}, @alu={0x7, 0x1, 0x8, 0x8, 0x0, 0x20, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x71, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xff}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @exit], &(0x7f0000000080)='syzkaller\x00', 0xa540, 0xd6, &(0x7f00000000c0)=""/214, 0x41000, 0x18, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x10, 0x9, 0x7abed388}, 0x10, r1, r0}, 0x80) (async) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) close(r0) 07:41:45 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async, rerun: 32) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (rerun: 32) r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x9000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000e000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) write$cgroup_pressure(r1, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000000000000000007149472bb22285ee11fd8e44a75a89e87c6900a62fc6412747e32d286e6cb5a7cc9d5caee88198a26742bab2c8e32b80c384872135e55e271bd496d2be34ef0cb0b903b65fb9eb131e2b8ea0f796863430c7fbfdeecbf93042202bb31ba52426ebf1a0520f53c20df8bb3c419ff4a4375336a742cfaf970dd5b7912e9f491e4d973d5b"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x6, &(0x7f00000000c0)=@raw=[@generic={0x9, 0x6, 0x6, 0x1000, 0x2}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe5d5}, @call={0x85, 0x0, 0x0, 0x6b}, @jmp={0x5, 0x1, 0xb, 0x2, 0x2, 0x1, 0x1}, @call={0x85, 0x0, 0x0, 0x79}], &(0x7f0000000100)='GPL\x00', 0x6, 0xf2, &(0x7f0000000140)=""/242, 0x40f00, 0x14, '\x00', r1, 0x1a, r2, 0x8, &(0x7f0000000580)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xd, 0x10000, 0x100}, 0x10, 0xe74e, r0, 0x0, &(0x7f0000000640)=[r3]}, 0x80) 07:41:45 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000f000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x9020000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) close(r0) 07:41:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000000000000000007149472bb22285ee11fd8e44a75a89e87c6900a62fc6412747e32d286e6cb5a7cc9d5caee88198a26742bab2c8e32b80c384872135e55e271bd496d2be34ef0cb0b903b65fb9eb131e2b8ea0f796863430c7fbfdeecbf93042202bb31ba52426ebf1a0520f53c20df8bb3c419ff4a4375336a742cfaf970dd5b7912e9f491e4d973d5b"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x6, &(0x7f00000000c0)=@raw=[@generic={0x9, 0x6, 0x6, 0x1000, 0x2}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe5d5}, @call={0x85, 0x0, 0x0, 0x6b}, @jmp={0x5, 0x1, 0xb, 0x2, 0x2, 0x1, 0x1}, @call={0x85, 0x0, 0x0, 0x79}], &(0x7f0000000100)='GPL\x00', 0x6, 0xf2, &(0x7f0000000140)=""/242, 0x40f00, 0x14, '\x00', r1, 0x1a, r2, 0x8, &(0x7f0000000580)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xd, 0x10000, 0x100}, 0x10, 0xe74e, r0, 0x0, &(0x7f0000000640)=[r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000000000000000007149472bb22285ee11fd8e44a75a89e87c6900a62fc6412747e32d286e6cb5a7cc9d5caee88198a26742bab2c8e32b80c384872135e55e271bd496d2be34ef0cb0b903b65fb9eb131e2b8ea0f796863430c7fbfdeecbf93042202bb31ba52426ebf1a0520f53c20df8bb3c419ff4a4375336a742cfaf970dd5b7912e9f491e4d973d5b"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x6, &(0x7f00000000c0)=@raw=[@generic={0x9, 0x6, 0x6, 0x1000, 0x2}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe5d5}, @call={0x85, 0x0, 0x0, 0x6b}, @jmp={0x5, 0x1, 0xb, 0x2, 0x2, 0x1, 0x1}, @call={0x85, 0x0, 0x0, 0x79}], &(0x7f0000000100)='GPL\x00', 0x6, 0xf2, &(0x7f0000000140)=""/242, 0x40f00, 0x14, '\x00', r1, 0x1a, r2, 0x8, &(0x7f0000000580)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xd, 0x10000, 0x100}, 0x10, 0xe74e, r0, 0x0, &(0x7f0000000640)=[r3]}, 0x80) (async) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000010000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) 07:41:45 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async, rerun: 64) r0 = getpid() (rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000011000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xa000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000000000000000007149472bb22285ee11fd8e44a75a89e87c6900a62fc6412747e32d286e6cb5a7cc9d5caee88198a26742bab2c8e32b80c384872135e55e271bd496d2be34ef0cb0b903b65fb9eb131e2b8ea0f796863430c7fbfdeecbf93042202bb31ba52426ebf1a0520f53c20df8bb3c419ff4a4375336a742cfaf970dd5b7912e9f491e4d973d5b"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x6, &(0x7f00000000c0)=@raw=[@generic={0x9, 0x6, 0x6, 0x1000, 0x2}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe5d5}, @call={0x85, 0x0, 0x0, 0x6b}, @jmp={0x5, 0x1, 0xb, 0x2, 0x2, 0x1, 0x1}, @call={0x85, 0x0, 0x0, 0x79}], &(0x7f0000000100)='GPL\x00', 0x6, 0xf2, &(0x7f0000000140)=""/242, 0x40f00, 0x14, '\x00', r1, 0x1a, r2, 0x8, &(0x7f0000000580)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xd, 0x10000, 0x100}, 0x10, 0xe74e, r0, 0x0, &(0x7f0000000640)=[r3]}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r0) 07:41:45 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x40000}, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000012000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r0) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xb000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r0) 07:41:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xa3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x8, 0x57, &(0x7f0000000080)=""/87, 0x41100, 0x1a, '\x00', r1, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x10, 0x400}, 0x10, r2, r3, 0x0, &(0x7f0000000580)=[r4, 0x1]}, 0x80) 07:41:45 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x32160000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xc000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000018000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) write$cgroup_pressure(r0, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xa3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x8, 0x57, &(0x7f0000000080)=""/87, 0x41100, 0x1a, '\x00', r1, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x10, 0x400}, 0x10, r2, r3, 0x0, &(0x7f0000000580)=[r4, 0x1]}, 0x80) 07:41:45 executing program 5: close(0xffffffffffffffff) close(0xffffffffffffffff) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xd000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000025000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xe000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xa3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x8, 0x57, &(0x7f0000000080)=""/87, 0x41100, 0x1a, '\x00', r1, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x10, 0x400}, 0x10, r2, r3, 0x0, &(0x7f0000000580)=[r4, 0x1]}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000003c000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: close(0xffffffffffffffff) close(0xffffffffffffffff) 07:41:45 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x32160000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x32160000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) (async) 07:41:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) write$cgroup_pressure(r0, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}}, &(0x7f00000015c0)='syzkaller\x00', 0x106, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x10000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000048000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: close(0xffffffffffffffff) close(0xffffffffffffffff) 07:41:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}}, &(0x7f00000015c0)='syzkaller\x00', 0x106, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000004c000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) write$cgroup_pressure(r0, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x11000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}}, &(0x7f00000015c0)='syzkaller\x00', 0x106, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:45 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x32160000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 07:41:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) write$cgroup_pressure(r0, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x12000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000040)=r0) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000061000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) 07:41:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) write$cgroup_pressure(r0, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000040)=r0) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000062000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x18000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000040)=r0) 07:41:45 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x1ff) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(0xffffffffffffffff) close(r0) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000063000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="01de11b9dcac65fe0c20e426dc3c1a0eab0aa7ed3a57b284231a41edec9705e63c3bd01d62f6d4490a32b2c334c27bd965a0a8c1de4c36595fc8c3cecde8f18e8dbe509235dd98252ced8b5fc796b1f6d63aafb17d1763ce4a91aef614961322943baecde5205fc09a3c807e3c890ec8b486e7cdfd107aaf283fb22cd6ee95a8ea06482f2745b9a5043c028722c6ff3993c846ebfbcefc5a939dbcdb3c6448a47cf5fb56459c6041fe788ef665cd5f80902574876d78b4cd4733a72338132118d726c08d5e86ff21250029198a340d05e8699149983961e3cda80a2cf186ed0c7b0866da3dc176ebdb45b2c4c382b3a8ec72", &(0x7f0000000140)=""/222}, 0x20) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x200) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x20000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(0xffffffffffffffff) close(r0) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="01de11b9dcac65fe0c20e426dc3c1a0eab0aa7ed3a57b284231a41edec9705e63c3bd01d62f6d4490a32b2c334c27bd965a0a8c1de4c36595fc8c3cecde8f18e8dbe509235dd98252ced8b5fc796b1f6d63aafb17d1763ce4a91aef614961322943baecde5205fc09a3c807e3c890ec8b486e7cdfd107aaf283fb22cd6ee95a8ea06482f2745b9a5043c028722c6ff3993c846ebfbcefc5a939dbcdb3c6448a47cf5fb56459c6041fe788ef665cd5f80902574876d78b4cd4733a72338132118d726c08d5e86ff21250029198a340d05e8699149983961e3cda80a2cf186ed0c7b0866da3dc176ebdb45b2c4c382b3a8ec72", &(0x7f0000000140)=""/222}, 0x20) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="01de11b9dcac65fe0c20e426dc3c1a0eab0aa7ed3a57b284231a41edec9705e63c3bd01d62f6d4490a32b2c334c27bd965a0a8c1de4c36595fc8c3cecde8f18e8dbe509235dd98252ced8b5fc796b1f6d63aafb17d1763ce4a91aef614961322943baecde5205fc09a3c807e3c890ec8b486e7cdfd107aaf283fb22cd6ee95a8ea06482f2745b9a5043c028722c6ff3993c846ebfbcefc5a939dbcdb3c6448a47cf5fb56459c6041fe788ef665cd5f80902574876d78b4cd4733a72338132118d726c08d5e86ff21250029198a340d05e8699149983961e3cda80a2cf186ed0c7b0866da3dc176ebdb45b2c4c382b3a8ec72", &(0x7f0000000140)=""/222}, 0x20) (async) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x200) (async) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x25000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000068000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x1ff) (async) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x40000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000069000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f00000005c0)={'some', 0x20, 0x3ff, 0x20, 0x8257}, 0x2f) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="01de11b9dcac65fe0c20e426dc3c1a0eab0aa7ed3a57b284231a41edec9705e63c3bd01d62f6d4490a32b2c334c27bd965a0a8c1de4c36595fc8c3cecde8f18e8dbe509235dd98252ced8b5fc796b1f6d63aafb17d1763ce4a91aef614961322943baecde5205fc09a3c807e3c890ec8b486e7cdfd107aaf283fb22cd6ee95a8ea06482f2745b9a5043c028722c6ff3993c846ebfbcefc5a939dbcdb3c6448a47cf5fb56459c6041fe788ef665cd5f80902574876d78b4cd4733a72338132118d726c08d5e86ff21250029198a340d05e8699149983961e3cda80a2cf186ed0c7b0866da3dc176ebdb45b2c4c382b3a8ec72", &(0x7f0000000140)=""/222}, 0x20) (async) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000000)=0x200) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(0xffffffffffffffff) close(r0) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x48000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x4c000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) close(0xffffffffffffffff) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000006a000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x1ff) 07:41:45 executing program 4: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x1ff) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) close(0xffffffffffffffff) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000006b000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x64000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000006c000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x66010000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) close(0xffffffffffffffff) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r0) recvmsg(r0, &(0x7f0000001240)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/133, 0x85}], 0x2, &(0x7f0000001180)=""/171, 0xab}, 0x60000003) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000071000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.numa_stat\x00', 0x0, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) perf_event_open$cgroup(&(0x7f00000001c0)={0x4, 0x80, 0x9, 0x80, 0xa2, 0x7f, 0x0, 0x40, 0x5212, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000240), 0x1}, 0x1800, 0x4, 0x3, 0x0, 0x0, 0x1, 0x7fff, 0x0, 0x3, 0x0, 0x45802c3d}, r4, 0x0, 0xffffffffffffffff, 0x9) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) 07:41:45 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000004c000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x68000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r0) (async, rerun: 64) recvmsg(r0, &(0x7f0000001240)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/133, 0x85}], 0x2, &(0x7f0000001180)=""/171, 0xab}, 0x60000003) (rerun: 64) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000072000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 4: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x32160000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r0) recvmsg(r0, &(0x7f0000001240)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/133, 0x85}], 0x2, &(0x7f0000001180)=""/171, 0xab}, 0x60000003) 07:41:45 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000f000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x6c000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 07:41:45 executing program 4: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x32160000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x74000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.numa_stat\x00', 0x0, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) (async) perf_event_open$cgroup(&(0x7f00000001c0)={0x4, 0x80, 0x9, 0x80, 0xa2, 0x7f, 0x0, 0x40, 0x5212, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000240), 0x1}, 0x1800, 0x4, 0x3, 0x0, 0x0, 0x1, 0x7fff, 0x0, 0x3, 0x0, 0x45802c3d}, r4, 0x0, 0xffffffffffffffff, 0x9) (async) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800004f39010000000ee4000000000000000004ee020000d8b9741a8863ab1d"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={&(0x7f0000000480)=""/155, 0x9b, 0x0, &(0x7f00000003c0)=""/43, 0x2b}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x4a, &(0x7f0000000080)=""/74, 0x40f00, 0x3, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x4, 0xfffffffa, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, r2]}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000073000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) (fail_nth: 1) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x7a000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000074000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800004f39010000000ee4000000000000000004ee020000d8b9741a8863ab1d"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={&(0x7f0000000480)=""/155, 0x9b, 0x0, &(0x7f00000003c0)=""/43, 0x2b}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x4a, &(0x7f0000000080)=""/74, 0x40f00, 0x3, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x4, 0xfffffffa, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, r2]}, 0x80) 07:41:45 executing program 4: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x32160000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x80ffffff, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000079000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 4: syz_clone(0x32160000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 2837.523279][T30494] FAULT_INJECTION: forcing a failure. [ 2837.523279][T30494] name fail_usercopy, interval 1, probability 0, space 0, times 0 07:41:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.numa_stat\x00', 0x0, 0x0) (async) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) perf_event_open$cgroup(&(0x7f00000001c0)={0x4, 0x80, 0x9, 0x80, 0xa2, 0x7f, 0x0, 0x40, 0x5212, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000240), 0x1}, 0x1800, 0x4, 0x3, 0x0, 0x0, 0x1, 0x7fff, 0x0, 0x3, 0x0, 0x45802c3d}, r4, 0x0, 0xffffffffffffffff, 0x9) (async) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000007a000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000007b000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x85ffffff, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2837.575497][T30494] CPU: 1 PID: 30494 Comm: syz-executor.5 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2837.585579][T30494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2837.595472][T30494] Call Trace: [ 2837.598594][T30494] [ 2837.601373][T30494] dump_stack_lvl+0x151/0x1b7 [ 2837.605883][T30494] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2837.611181][T30494] dump_stack+0x15/0x17 [ 2837.615170][T30494] should_fail+0x3c0/0x510 [ 2837.619423][T30494] should_fail_usercopy+0x1a/0x20 [ 2837.624283][T30494] _copy_to_user+0x20/0x90 [ 2837.628536][T30494] simple_read_from_buffer+0xdd/0x160 [ 2837.633743][T30494] proc_fail_nth_read+0x1af/0x220 [ 2837.638604][T30494] ? proc_fault_inject_write+0x3a0/0x3a0 [ 2837.644073][T30494] ? security_file_permission+0x497/0x5f0 [ 2837.649628][T30494] ? proc_fault_inject_write+0x3a0/0x3a0 [ 2837.655096][T30494] vfs_read+0x299/0xd80 [ 2837.659082][T30494] ? rcu_gp_kthread_wake+0x90/0x90 [ 2837.664027][T30494] ? kernel_read+0x1f0/0x1f0 [ 2837.668455][T30494] ? __kasan_check_write+0x14/0x20 [ 2837.673405][T30494] ? mutex_lock+0xb6/0x130 [ 2837.677660][T30494] ? wait_for_completion_killable_timeout+0x10/0x10 [ 2837.684079][T30494] ? __fdget_pos+0x26d/0x310 [ 2837.688506][T30494] ? ksys_read+0x77/0x2c0 [ 2837.692669][T30494] ksys_read+0x198/0x2c0 [ 2837.696751][T30494] ? vfs_write+0x1050/0x1050 [ 2837.701176][T30494] ? ____fput+0x15/0x20 [ 2837.705170][T30494] ? debug_smp_processor_id+0x17/0x20 [ 2837.710376][T30494] __x64_sys_read+0x7b/0x90 [ 2837.714716][T30494] do_syscall_64+0x44/0xd0 [ 2837.718969][T30494] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2837.724694][T30494] RIP: 0033:0x7f9653226efc [ 2837.728949][T30494] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2837.748390][T30494] RSP: 002b:00007f9651fe8160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2837.756640][T30494] RAX: ffffffffffffffda RBX: 00007f9653394f80 RCX: 00007f9653226efc [ 2837.764447][T30494] RDX: 000000000000000f RSI: 00007f9651fe81e0 RDI: 0000000000000004 07:41:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000b0000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x90ffffff, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800004f39010000000ee4000000000000000004ee020000d8b9741a8863ab1d"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={&(0x7f0000000480)=""/155, 0x9b, 0x0, &(0x7f00000003c0)=""/43, 0x2b}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x4a, &(0x7f0000000080)=""/74, 0x40f00, 0x3, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x4, 0xfffffffa, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, r2]}, 0x80) 07:41:46 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = syz_clone(0x7089aa00, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x7f, 0xc0, 0x9, 0x0, 0x200, 0x2020, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f00000000c0), 0x8}, 0x1080, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x1f, 0x0, 0x7, 0x0, 0x8001}, 0x0, 0xa, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='}\x00'}, 0x30) 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000dd000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) [ 2837.772257][T30494] RBP: 00007f9651fe81d0 R08: 0000000000000000 R09: 0000000000000000 [ 2837.780067][T30494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2837.787879][T30494] R13: 00007ffd7305561f R14: 00007f9651fe8300 R15: 0000000000022000 [ 2837.795697][T30494] 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x95010000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000000)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000f0000000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r0 = syz_clone(0x7089aa00, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x7f, 0xc0, 0x9, 0x0, 0x200, 0x2020, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f00000000c0), 0x8}, 0x1080, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x1f, 0x0, 0x7, 0x0, 0x8001}, 0x0, 0xa, r1, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='}\x00'}, 0x30) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x98010000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 07:41:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000000)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(r2) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000000)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000005010000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async, rerun: 64) r0 = syz_clone(0x7089aa00, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) (async, rerun: 64) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x7f, 0xc0, 0x9, 0x0, 0x200, 0x2020, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f00000000c0), 0x8}, 0x1080, 0x1, 0x0, 0x3, 0x9, 0x8001, 0x1f, 0x0, 0x7, 0x0, 0x8001}, 0x0, 0xa, r1, 0x0) (async, rerun: 32) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='}\x00'}, 0x30) (rerun: 32) 07:41:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x99020000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r0) (async) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000000)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xb0000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000095010000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x2, &(0x7f0000001500)=@raw=[@alu={0x4, 0x0, 0x0, 0x2, 0x2, 0xffffffffffffffff, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x1}], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xc8c51a00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000098010000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) 07:41:46 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) openat$cgroup_ro(r0, &(0x7f0000000100)='memory.numa_stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x2, &(0x7f0000001500)=@raw=[@alu={0x4, 0x0, 0x0, 0x2, 0x2, 0xffffffffffffffff, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x1}], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xdd000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000030000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 07:41:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xffffffffffffff58) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x4, [@restrict={0x1, 0x0, 0x0, 0xb, 0x4}, @fwd={0x2}, @typedef={0xa, 0x0, 0x0, 0x8, 0x2}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @restrict={0xa, 0x0, 0x0, 0xb, 0x3}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @enum={0x5, 0x5, 0x0, 0x6, 0x4, [{0xa, 0x2}, {0x0, 0x9ea8}, {0xf, 0x6}, {0x9, 0xfffffffc}, {0x8, 0x1f}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000480)=""/192, 0x98, 0xc0}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r6, r6, 0xffffffffffffffff, r6, r6, r6, r6, r6, 0xffffffffffffffff]}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r7, r7, 0xffffffffffffffff, r7, r7, r7, r7, r7, 0xffffffffffffffff]}, 0x80) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x3, 0x4, 0x7, 0x9, 0xc62, 0x1, 0x52, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0xf, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x48b2, 0x0, 0x0, 0x0, 0x1}, [@jmp={0x5, 0x1, 0x6, 0x9, 0x9, 0xffffffffffffffff, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, @alu={0x7, 0x0, 0x2, 0x8, 0xce309389de93fad5, 0x80}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xdd32}, @map_idx={0x18, 0x9}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd3, &(0x7f0000000200)=""/211, 0x41100, 0x6, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000740)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x2, 0xb0, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r3, r6, r2, r3, r2, r3, r7, r8]}, 0x80) close(r0) 07:41:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x2, &(0x7f0000001500)=@raw=[@alu={0x4, 0x0, 0x0, 0x2, 0x2, 0xffffffffffffffff, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x1}], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x2, &(0x7f0000001500)=@raw=[@alu={0x4, 0x0, 0x0, 0x2, 0x2, 0xffffffffffffffff, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x1}], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) 07:41:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xffffffffffffff58) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x4, [@restrict={0x1, 0x0, 0x0, 0xb, 0x4}, @fwd={0x2}, @typedef={0xa, 0x0, 0x0, 0x8, 0x2}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @restrict={0xa, 0x0, 0x0, 0xb, 0x3}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @enum={0x5, 0x5, 0x0, 0x6, 0x4, [{0xa, 0x2}, {0x0, 0x9ea8}, {0xf, 0x6}, {0x9, 0xfffffffc}, {0x8, 0x1f}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000480)=""/192, 0x98, 0xc0}, 0x20) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r6, r6, 0xffffffffffffffff, r6, r6, r6, r6, r6, 0xffffffffffffffff]}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r7, r7, 0xffffffffffffffff, r7, r7, r7, r7, r7, 0xffffffffffffffff]}, 0x80) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x3, 0x4, 0x7, 0x9, 0xc62, 0x1, 0x52, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0xf, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x48b2, 0x0, 0x0, 0x0, 0x1}, [@jmp={0x5, 0x1, 0x6, 0x9, 0x9, 0xffffffffffffffff, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, @alu={0x7, 0x0, 0x2, 0x8, 0xce309389de93fad5, 0x80}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xdd32}, @map_idx={0x18, 0x9}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd3, &(0x7f0000000200)=""/211, 0x41100, 0x6, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000740)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x2, 0xb0, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r3, r6, r2, r3, r2, r3, r7, r8]}, 0x80) (async) close(r0) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xf0000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 07:41:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x19, 0x3, 0x296a, 0x4, 0x6, r2, 0x10000, '\x00', r3, r4, 0x3, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, r1, 0x25, 0x0, r5}, 0x14) 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fb030000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) openat$cgroup_ro(r0, &(0x7f0000000100)='memory.numa_stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) openat$cgroup_ro(r0, &(0x7f0000000100)='memory.numa_stat\x00', 0x0, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) (async) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000050000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x19, 0x3, 0x296a, 0x4, 0x6, r2, 0x10000, '\x00', r3, r4, 0x3, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, r1, 0x25, 0x0, r5}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x58, &(0x7f0000000080)}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x19, 0x3, 0x296a, 0x4, 0x6, r2, 0x10000, '\x00', r3, r4, 0x3, 0x2}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, r1, 0x25, 0x0, r5}, 0x14) (async) 07:41:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xffffffffffffff58) (async, rerun: 64) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x4, [@restrict={0x1, 0x0, 0x0, 0xb, 0x4}, @fwd={0x2}, @typedef={0xa, 0x0, 0x0, 0x8, 0x2}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @restrict={0xa, 0x0, 0x0, 0xb, 0x3}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @enum={0x5, 0x5, 0x0, 0x6, 0x4, [{0xa, 0x2}, {0x0, 0x9ea8}, {0xf, 0x6}, {0x9, 0xfffffffc}, {0x8, 0x1f}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000480)=""/192, 0x98, 0xc0}, 0x20) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r6, r6, 0xffffffffffffffff, r6, r6, r6, r6, r6, 0xffffffffffffffff]}, 0x80) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r7, r7, 0xffffffffffffffff, r7, r7, r7, r7, r7, 0xffffffffffffffff]}, 0x80) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x3, 0x4, 0x7, 0x9, 0xc62, 0x1, 0x52, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0xf, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x48b2, 0x0, 0x0, 0x0, 0x1}, [@jmp={0x5, 0x1, 0x6, 0x9, 0x9, 0xffffffffffffffff, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, @alu={0x7, 0x0, 0x2, 0x8, 0xce309389de93fad5, 0x80}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xdd32}, @map_idx={0x18, 0x9}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd3, &(0x7f0000000200)=""/211, 0x41100, 0x6, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000740)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x2, 0xb0, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r3, r6, r2, r3, r2, r3, r7, r8]}, 0x80) (async, rerun: 32) close(r0) (rerun: 32) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xfb030000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2838.059553][T30624] FAULT_INJECTION: forcing a failure. [ 2838.059553][T30624] name failslab, interval 1, probability 0, space 0, times 0 [ 2838.091294][T30624] CPU: 0 PID: 30624 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2838.101372][T30624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2838.111268][T30624] Call Trace: [ 2838.114393][T30624] [ 2838.117167][T30624] dump_stack_lvl+0x151/0x1b7 [ 2838.121681][T30624] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2838.126975][T30624] ? do_handle_mm_fault+0x142f/0x2370 [ 2838.132184][T30624] dump_stack+0x15/0x17 [ 2838.136177][T30624] should_fail+0x3c0/0x510 [ 2838.140430][T30624] __should_failslab+0x9f/0xe0 [ 2838.145030][T30624] should_failslab+0x9/0x20 [ 2838.149369][T30624] kmem_cache_alloc+0x4f/0x2f0 [ 2838.153967][T30624] ? dup_task_struct+0x53/0xa60 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000001050000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) openat$cgroup_ro(r0, &(0x7f0000000100)='memory.numa_stat\x00', 0x0, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xff000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xffffff80, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2838.158654][T30624] ? __kasan_check_write+0x14/0x20 [ 2838.163602][T30624] dup_task_struct+0x53/0xa60 [ 2838.168115][T30624] ? __kasan_check_write+0x14/0x20 [ 2838.173060][T30624] copy_process+0x579/0x3250 [ 2838.177486][T30624] ? __kasan_check_write+0x14/0x20 [ 2838.182434][T30624] ? proc_fail_nth_write+0x213/0x290 [ 2838.187551][T30624] ? proc_fail_nth_read+0x220/0x220 [ 2838.192591][T30624] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2838.197532][T30624] ? vfs_write+0x9af/0x1050 [ 2838.201870][T30624] ? vmacache_update+0xb7/0x120 [ 2838.206558][T30624] kernel_clone+0x22d/0x990 [ 2838.210897][T30624] ? file_end_write+0x1b0/0x1b0 [ 2838.215584][T30624] ? __kasan_check_write+0x14/0x20 [ 2838.220531][T30624] ? create_io_thread+0x1e0/0x1e0 [ 2838.225393][T30624] ? __mutex_lock_slowpath+0x10/0x10 [ 2838.230513][T30624] __x64_sys_clone+0x289/0x310 [ 2838.235113][T30624] ? __do_sys_vfork+0x130/0x130 [ 2838.239802][T30624] ? debug_smp_processor_id+0x17/0x20 [ 2838.245013][T30624] do_syscall_64+0x44/0xd0 [ 2838.249258][T30624] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2838.255075][T30624] RIP: 0033:0x7f4243ed90d9 [ 2838.259327][T30624] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2838.278769][T30624] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2838.287015][T30624] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2838.294824][T30624] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2838.302636][T30624] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:41:46 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xffffff85, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000060000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000000)="4bc61faa6440ce49116dd97176742fe8b36edde6eaa1b2026dde80ee90e41cfc87be6eea5692a48bc4056ecac1f67e481ea8b24e8891c8ef116178c8e17949126f246fcc2e24be", &(0x7f0000000080)=""/41, 0x4}, 0x20) 07:41:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x19, 0x3, 0x296a, 0x4, 0x6, r2, 0x10000, '\x00', r3, r4, 0x3, 0x2}, 0x48) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async, rerun: 32) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, r1, 0x25, 0x0, r5}, 0x14) 07:41:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000070000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0xffffff90, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000000)="4bc61faa6440ce49116dd97176742fe8b36edde6eaa1b2026dde80ee90e41cfc87be6eea5692a48bc4056ecac1f67e481ea8b24e8891c8ef116178c8e17949126f246fcc2e24be", &(0x7f0000000080)=""/41, 0x4}, 0x20) [ 2838.310448][T30624] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2838.318258][T30624] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2838.326071][T30624] 07:41:46 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x7, 0x100, 0x96, 0x800, 0x1, 0x3, '\x00', 0x0, r0, 0x3, 0x4, 0x2, 0x8}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="65efa269faffffff1831000003000000000000000000000095000000000000009500000000000000fe646607008e6c9b31a786e5e1eb225fe8a56cddd3bdb46e8983c00706566400661c2b818cfc58a8ad7f64c4078c8cfe8a118db50fc4bca4e12c28cc0c1d4f004dea086730b3aed66a516c823938ed9288acb4ec35ff09df"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=r1, 0xffffffffffffffff, 0xe, 0x6, r3}, 0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000000100), 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r5, r5, 0xffffffffffffffff, r5, r5, r5, r5, r5, 0xffffffffffffffff]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r5, 0x58, &(0x7f0000000040)}, 0x10) 07:41:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x1, 0x1, 0xff, 0x8, 0x0, 0x7fffffff, 0x80100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff2f3d, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x84000, 0x100, 0xfffffffe, 0x3, 0x2, 0x3, 0x5, 0x0, 0xffffff80, 0x0, 0x11bf5fc0}, r0, 0x1, r1, 0xa) 07:41:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x1, 0x1, 0xff, 0x8, 0x0, 0x7fffffff, 0x80100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff2f3d, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x84000, 0x100, 0xfffffffe, 0x3, 0x2, 0x3, 0x5, 0x0, 0xffffff80, 0x0, 0x11bf5fc0}, r0, 0x1, r1, 0xa) 07:41:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000000)="4bc61faa6440ce49116dd97176742fe8b36edde6eaa1b2026dde80ee90e41cfc87be6eea5692a48bc4056ecac1f67e481ea8b24e8891c8ef116178c8e17949126f246fcc2e24be", &(0x7f0000000080)=""/41, 0x4}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000000)="4bc61faa6440ce49116dd97176742fe8b36edde6eaa1b2026dde80ee90e41cfc87be6eea5692a48bc4056ecac1f67e481ea8b24e8891c8ef116178c8e17949126f246fcc2e24be", &(0x7f0000000080)=""/41, 0x4}, 0x20) (async) [ 2838.375602][T30683] FAULT_INJECTION: forcing a failure. [ 2838.375602][T30683] name failslab, interval 1, probability 0, space 0, times 0 [ 2838.404062][T30683] CPU: 1 PID: 30683 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2838.414135][T30683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2838.424033][T30683] Call Trace: [ 2838.427154][T30683] [ 2838.429932][T30683] dump_stack_lvl+0x151/0x1b7 [ 2838.434448][T30683] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2838.439735][T30683] ? __kasan_slab_alloc+0xc4/0xe0 [ 2838.444594][T30683] ? kmem_cache_alloc+0x189/0x2f0 [ 2838.449454][T30683] dump_stack+0x15/0x17 [ 2838.453450][T30683] should_fail+0x3c0/0x510 [ 2838.457700][T30683] ? __get_vm_area_node+0x13a/0x380 [ 2838.462735][T30683] __should_failslab+0x9f/0xe0 [ 2838.467334][T30683] should_failslab+0x9/0x20 [ 2838.471673][T30683] kmem_cache_alloc_trace+0x4a/0x310 [ 2838.476793][T30683] __get_vm_area_node+0x13a/0x380 [ 2838.481656][T30683] __vmalloc_node_range+0xda/0x800 [ 2838.486599][T30683] ? copy_process+0x579/0x3250 [ 2838.491203][T30683] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2838.496060][T30683] ? dup_task_struct+0x53/0xa60 [ 2838.500754][T30683] dup_task_struct+0x61f/0xa60 [ 2838.505347][T30683] ? copy_process+0x579/0x3250 [ 2838.509948][T30683] ? __kasan_check_write+0x14/0x20 [ 2838.514895][T30683] copy_process+0x579/0x3250 [ 2838.519323][T30683] ? __kasan_check_write+0x14/0x20 [ 2838.524269][T30683] ? proc_fail_nth_write+0x213/0x290 [ 2838.529389][T30683] ? proc_fail_nth_read+0x220/0x220 [ 2838.534426][T30683] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2838.539369][T30683] ? vfs_write+0x9af/0x1050 [ 2838.543717][T30683] ? vmacache_update+0xb7/0x120 [ 2838.548398][T30683] kernel_clone+0x22d/0x990 [ 2838.552737][T30683] ? file_end_write+0x1b0/0x1b0 [ 2838.557422][T30683] ? __kasan_check_write+0x14/0x20 [ 2838.562370][T30683] ? create_io_thread+0x1e0/0x1e0 [ 2838.567230][T30683] ? __mutex_lock_slowpath+0x10/0x10 [ 2838.572352][T30683] __x64_sys_clone+0x289/0x310 [ 2838.576953][T30683] ? __do_sys_vfork+0x130/0x130 [ 2838.581665][T30683] ? debug_smp_processor_id+0x17/0x20 [ 2838.586845][T30683] do_syscall_64+0x44/0xd0 [ 2838.591097][T30683] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2838.596826][T30683] RIP: 0033:0x7f4243ed90d9 [ 2838.601079][T30683] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2838.620519][T30683] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2838.628764][T30683] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2838.636575][T30683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2838.644389][T30683] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2838.652199][T30683] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2838.660009][T30683] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2838.667823][T30683] [ 2838.674178][T30683] warn_alloc: 3 callbacks suppressed [ 2838.674192][T30683] syz-executor.4: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 2838.694498][T30683] CPU: 1 PID: 30683 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2838.704478][T30683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2838.714369][T30683] Call Trace: [ 2838.717494][T30683] [ 2838.720270][T30683] dump_stack_lvl+0x151/0x1b7 [ 2838.724783][T30683] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2838.730080][T30683] ? pr_cont_kernfs_name+0xe6/0x100 [ 2838.735112][T30683] dump_stack+0x15/0x17 [ 2838.739103][T30683] warn_alloc+0x242/0x3d0 [ 2838.743271][T30683] ? zone_watermark_ok_safe+0x280/0x280 [ 2838.748651][T30683] ? __get_vm_area_node+0x36a/0x380 [ 2838.753687][T30683] __vmalloc_node_range+0x2be/0x800 [ 2838.758719][T30683] ? dup_task_struct+0x53/0xa60 [ 2838.763406][T30683] dup_task_struct+0x61f/0xa60 [ 2838.768006][T30683] ? copy_process+0x579/0x3250 [ 2838.772608][T30683] ? __kasan_check_write+0x14/0x20 [ 2838.777551][T30683] copy_process+0x579/0x3250 [ 2838.781978][T30683] ? __kasan_check_write+0x14/0x20 [ 2838.786925][T30683] ? proc_fail_nth_write+0x213/0x290 [ 2838.792047][T30683] ? proc_fail_nth_read+0x220/0x220 [ 2838.797079][T30683] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2838.802028][T30683] ? vfs_write+0x9af/0x1050 [ 2838.806368][T30683] ? vmacache_update+0xb7/0x120 [ 2838.811053][T30683] kernel_clone+0x22d/0x990 [ 2838.815395][T30683] ? file_end_write+0x1b0/0x1b0 [ 2838.820078][T30683] ? __kasan_check_write+0x14/0x20 [ 2838.825028][T30683] ? create_io_thread+0x1e0/0x1e0 [ 2838.829887][T30683] ? __mutex_lock_slowpath+0x10/0x10 [ 2838.835010][T30683] __x64_sys_clone+0x289/0x310 [ 2838.839609][T30683] ? __do_sys_vfork+0x130/0x130 [ 2838.844323][T30683] ? debug_smp_processor_id+0x17/0x20 [ 2838.849501][T30683] do_syscall_64+0x44/0xd0 [ 2838.853755][T30683] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2838.859482][T30683] RIP: 0033:0x7f4243ed90d9 [ 2838.863737][T30683] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2838.883176][T30683] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2838.891429][T30683] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2838.899234][T30683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2838.907044][T30683] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2838.914855][T30683] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2838.922672][T30683] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2838.930574][T30683] [ 2838.934448][T30683] Mem-Info: [ 2838.937366][T30683] active_anon:15492 inactive_anon:16763 isolated_anon:0 [ 2838.937366][T30683] active_file:8023 inactive_file:8828 isolated_file:0 [ 2838.937366][T30683] unevictable:0 dirty:49 writeback:0 [ 2838.937366][T30683] slab_reclaimable:19737 slab_unreclaimable:73639 [ 2838.937366][T30683] mapped:28806 shmem:15553 pagetables:562 bounce:0 [ 2838.937366][T30683] kernel_misc_reclaimable:0 [ 2838.937366][T30683] free:1522099 free_pcp:24573 free_cma:0 [ 2838.978835][T30683] Node 0 active_anon:61976kB inactive_anon:67012kB active_file:32092kB inactive_file:35312kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:115188kB dirty:196kB writeback:0kB shmem:62228kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4576kB pagetables:2208kB all_unreclaimable? no [ 2839.009462][T30683] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982424kB mlocked:0kB bounce:0kB free_pcp:5700kB local_pcp:1828kB free_cma:0kB [ 2839.036547][T30683] lowmem_reserve[]: 0 3941 3941 [ 2839.041170][T30683] Normal free:3111672kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:61976kB inactive_anon:67012kB active_file:32092kB inactive_file:35312kB unevictable:0kB writepending:196kB present:5242880kB managed:4035848kB mlocked:0kB bounce:0kB free_pcp:92552kB local_pcp:51968kB free_cma:0kB [ 2839.070312][T30683] lowmem_reserve[]: 0 0 0 [ 2839.074423][T30683] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB [ 2839.089621][T30683] Normal: 6848*4kB (UME) 9667*8kB (UME) 7154*16kB (UME) 4366*32kB (UME) 3214*64kB (UME) 1441*128kB (UME) 475*256kB (UME) 95*512kB (UME) 21*1024kB (UM) 8*2048kB (UME) 526*4096kB (UM) = 3111672kB [ 2839.108509][T30683] 32408 total pagecache pages [ 2839.112982][T30683] 0 pages in swap cache [ 2839.116994][T30683] Swap cache stats: add 0, delete 0, find 0/0 [ 2839.122875][T30683] Free swap = 0kB 07:41:47 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) 07:41:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) (async) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x1, 0x1, 0xff, 0x8, 0x0, 0x7fffffff, 0x80100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff2f3d, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x84000, 0x100, 0xfffffffe, 0x3, 0x2, 0x3, 0x5, 0x0, 0xffffff80, 0x0, 0x11bf5fc0}, r0, 0x1, r1, 0xa) 07:41:47 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000090000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:47 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'veth1_to_team\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="85100000faffffff18310000030000000000009500000000000000"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000200)=""/111, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8201}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000100), 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000140)=0x81) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r7, r7, 0xffffffffffffffff, r7, r7, r7, r7, r7, 0xffffffffffffffff]}, 0x80) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="87100000fa0000fbff0000950000008000"/40], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r8, r8, 0xffffffffffffffff, r8, r8, r8, r8, r8, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r9, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r10, r10, 0xffffffffffffffff, r10, r10, r10, r10, r10, 0xffffffffffffffff]}, 0x80) r11 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) close(r11) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r8, 0x4) 07:41:47 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:47 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x7, 0x100, 0x96, 0x800, 0x1, 0x3, '\x00', 0x0, r0, 0x3, 0x4, 0x2, 0x8}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="65efa269faffffff1831000003000000000000000000000095000000000000009500000000000000fe646607008e6c9b31a786e5e1eb225fe8a56cddd3bdb46e8983c00706566400661c2b818cfc58a8ad7f64c4078c8cfe8a118db50fc4bca4e12c28cc0c1d4f004dea086730b3aed66a516c823938ed9288acb4ec35ff09df"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=r1, 0xffffffffffffffff, 0xe, 0x6, r3}, 0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000000100), 0x2, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r5, r5, 0xffffffffffffffff, r5, r5, r5, r5, r5, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r5, 0x58, &(0x7f0000000040)}, 0x10) 07:41:47 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'veth1_to_team\x00'}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="85100000faffffff18310000030000000000009500000000000000"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000200)=""/111, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8201}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000100), 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000140)=0x81) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r7, r7, 0xffffffffffffffff, r7, r7, r7, r7, r7, 0xffffffffffffffff]}, 0x80) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="87100000fa0000fbff0000950000008000"/40], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r8, r8, 0xffffffffffffffff, r8, r8, r8, r8, r8, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r9, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r10, r10, 0xffffffffffffffff, r10, r10, r10, r10, r10, 0xffffffffffffffff]}, 0x80) r11 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) close(r11) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r8, 0x4) 07:41:47 executing program 0: socketpair(0x1f, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000040)=@phonet, 0x80, &(0x7f0000001100)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/42, 0x2a}], 0x2, &(0x7f0000001140)=""/182, 0xb6}, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:47 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2839.126461][T30683] Total swap = 0kB [ 2839.129990][T30683] 2097051 pages RAM [ 2839.133656][T30683] 0 pages HighMem/MovableOnly [ 2839.138150][T30683] 342483 pages reserved [ 2839.142141][T30683] 0 pages cma reserved 07:41:47 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000a0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:47 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'veth1_to_team\x00'}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="85100000faffffff18310000030000000000009500000000000000"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000200)=""/111, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8201}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async, rerun: 64) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000100), 0x10) (rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000140)=0x81) (async, rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r7, r7, 0xffffffffffffffff, r7, r7, r7, r7, r7, 0xffffffffffffffff]}, 0x80) (async, rerun: 64) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 64) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="87100000fa0000fbff0000950000008000"/40], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r8, r8, 0xffffffffffffffff, r8, r8, r8, r8, r8, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r9, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async, rerun: 32) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 32) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r10, r10, 0xffffffffffffffff, r10, r10, r10, r10, r10, 0xffffffffffffffff]}, 0x80) (async) r11 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) close(r11) (async, rerun: 32) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r8, 0x4) (rerun: 32) 07:41:47 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x7, 0x100, 0x96, 0x800, 0x1, 0x3, '\x00', 0x0, r0, 0x3, 0x4, 0x2, 0x8}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="65efa269faffffff1831000003000000000000000000000095000000000000009500000000000000fe646607008e6c9b31a786e5e1eb225fe8a56cddd3bdb46e8983c00706566400661c2b818cfc58a8ad7f64c4078c8cfe8a118db50fc4bca4e12c28cc0c1d4f004dea086730b3aed66a516c823938ed9288acb4ec35ff09df"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=r1, 0xffffffffffffffff, 0xe, 0x6, r3}, 0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) (async) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000000100), 0x2, 0x0) (async, rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r5, r5, 0xffffffffffffffff, r5, r5, r5, r5, r5, 0xffffffffffffffff]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r5, 0x58, &(0x7f0000000040)}, 0x10) [ 2839.172727][T30714] FAULT_INJECTION: forcing a failure. [ 2839.172727][T30714] name failslab, interval 1, probability 0, space 0, times 0 [ 2839.186433][T30714] CPU: 0 PID: 30714 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2839.196490][T30714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2839.206388][T30714] Call Trace: [ 2839.209506][T30714] [ 2839.212283][T30714] dump_stack_lvl+0x151/0x1b7 [ 2839.216804][T30714] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2839.222094][T30714] ? __get_vm_area_node+0x13a/0x380 [ 2839.227129][T30714] ? ____kasan_kmalloc+0xee/0x110 [ 2839.231995][T30714] ? ____kasan_kmalloc+0xdc/0x110 [ 2839.236848][T30714] dump_stack+0x15/0x17 [ 2839.240838][T30714] should_fail+0x3c0/0x510 [ 2839.245095][T30714] __should_failslab+0x9f/0xe0 [ 2839.249692][T30714] should_failslab+0x9/0x20 [ 2839.254031][T30714] kmem_cache_alloc+0x4f/0x2f0 [ 2839.258630][T30714] ? alloc_vmap_area+0x19a/0x1a90 [ 2839.263491][T30714] alloc_vmap_area+0x19a/0x1a90 [ 2839.268176][T30714] ? vm_map_ram+0xa80/0xa80 [ 2839.272512][T30714] ? __kasan_kmalloc+0x9/0x10 [ 2839.277029][T30714] ? __get_vm_area_node+0x13a/0x380 [ 2839.282151][T30714] __get_vm_area_node+0x17b/0x380 [ 2839.287010][T30714] __vmalloc_node_range+0xda/0x800 [ 2839.291954][T30714] ? copy_process+0x579/0x3250 [ 2839.296554][T30714] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2839.301417][T30714] ? dup_task_struct+0x53/0xa60 [ 2839.306102][T30714] dup_task_struct+0x61f/0xa60 [ 2839.310701][T30714] ? copy_process+0x579/0x3250 [ 2839.315302][T30714] ? __kasan_check_write+0x14/0x20 [ 2839.320247][T30714] copy_process+0x579/0x3250 [ 2839.324676][T30714] ? __kasan_check_write+0x14/0x20 [ 2839.329621][T30714] ? proc_fail_nth_write+0x213/0x290 [ 2839.334745][T30714] ? proc_fail_nth_read+0x220/0x220 [ 2839.339779][T30714] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2839.344725][T30714] ? vfs_write+0x9af/0x1050 [ 2839.349062][T30714] ? vmacache_update+0xb7/0x120 [ 2839.353750][T30714] kernel_clone+0x22d/0x990 [ 2839.358092][T30714] ? file_end_write+0x1b0/0x1b0 [ 2839.362774][T30714] ? __kasan_check_write+0x14/0x20 [ 2839.367728][T30714] ? create_io_thread+0x1e0/0x1e0 [ 2839.372583][T30714] ? __mutex_lock_slowpath+0x10/0x10 [ 2839.377705][T30714] __x64_sys_clone+0x289/0x310 [ 2839.382305][T30714] ? __do_sys_vfork+0x130/0x130 [ 2839.386990][T30714] ? debug_smp_processor_id+0x17/0x20 [ 2839.392198][T30714] do_syscall_64+0x44/0xd0 [ 2839.396453][T30714] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2839.402180][T30714] RIP: 0033:0x7f4243ed90d9 [ 2839.406433][T30714] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2839.425873][T30714] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2839.434117][T30714] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2839.441928][T30714] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2839.449741][T30714] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2839.457552][T30714] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2839.465365][T30714] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 07:41:47 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4) 07:41:47 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000b0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:47 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:47 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r2) close(r0) 07:41:47 executing program 0: socketpair(0x1f, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000040)=@phonet, 0x80, &(0x7f0000001100)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/42, 0x2a}], 0x2, &(0x7f0000001140)=""/182, 0xb6}, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) socketpair(0x1f, 0x6, 0x4, &(0x7f0000000000)) (async) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000040)=@phonet, 0x80, &(0x7f0000001100)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/42, 0x2a}], 0x2, &(0x7f0000001140)=""/182, 0xb6}, 0x1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) 07:41:47 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000c0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:47 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2839.473178][T30714] [ 2839.491268][T30747] FAULT_INJECTION: forcing a failure. [ 2839.491268][T30747] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2839.504500][T30747] CPU: 0 PID: 30747 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2839.514549][T30747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 07:41:47 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r2) (async) close(r0) 07:41:47 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x9, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xfb}], &(0x7f0000000040)='GPL\x00', 0x3d0, 0x45, &(0x7f0000000080)=""/69, 0x40f00, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000100)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x8, 0x6, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1, 0xffffffffffffffff, 0x1, r2, r3]}, 0x80) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:47 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r2) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) close(r2) (async) close(r0) (async) 07:41:47 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2839.524446][T30747] Call Trace: [ 2839.527566][T30747] [ 2839.530348][T30747] dump_stack_lvl+0x151/0x1b7 [ 2839.534861][T30747] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2839.540152][T30747] ? stack_trace_save+0x12d/0x1f0 [ 2839.545015][T30747] ? is_bpf_text_address+0x1a2/0x1c0 [ 2839.550133][T30747] dump_stack+0x15/0x17 [ 2839.554125][T30747] should_fail+0x3c0/0x510 [ 2839.558384][T30747] should_fail_alloc_page+0x58/0x70 [ 2839.563415][T30747] __alloc_pages+0x1de/0x7c0 [ 2839.567838][T30747] ? kmem_cache_alloc+0x189/0x2f0 07:41:47 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000d0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2839.572700][T30747] ? __x64_sys_clone+0x289/0x310 [ 2839.577474][T30747] ? __count_vm_events+0x30/0x30 [ 2839.582251][T30747] __get_free_pages+0xe/0x30 [ 2839.586686][T30747] kasan_populate_vmalloc_pte+0x39/0x130 [ 2839.592138][T30747] ? __apply_to_page_range+0x8a5/0xb90 [ 2839.597436][T30747] __apply_to_page_range+0x8b8/0xb90 [ 2839.602555][T30747] ? kasan_populate_vmalloc+0x70/0x70 [ 2839.607766][T30747] ? kasan_populate_vmalloc+0x70/0x70 [ 2839.612969][T30747] apply_to_page_range+0x3b/0x50 [ 2839.617745][T30747] kasan_populate_vmalloc+0x65/0x70 [ 2839.622777][T30747] alloc_vmap_area+0x1946/0x1a90 [ 2839.627552][T30747] ? vm_map_ram+0xa80/0xa80 [ 2839.631886][T30747] ? __kasan_kmalloc+0x9/0x10 [ 2839.636400][T30747] ? __get_vm_area_node+0x13a/0x380 [ 2839.641435][T30747] __get_vm_area_node+0x17b/0x380 [ 2839.646298][T30747] __vmalloc_node_range+0xda/0x800 [ 2839.651240][T30747] ? copy_process+0x579/0x3250 [ 2839.655843][T30747] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2839.660702][T30747] ? dup_task_struct+0x53/0xa60 [ 2839.665388][T30747] dup_task_struct+0x61f/0xa60 [ 2839.669992][T30747] ? copy_process+0x579/0x3250 [ 2839.674589][T30747] ? __kasan_check_write+0x14/0x20 [ 2839.679536][T30747] copy_process+0x579/0x3250 [ 2839.683962][T30747] ? __kasan_check_write+0x14/0x20 [ 2839.688909][T30747] ? proc_fail_nth_write+0x213/0x290 [ 2839.694029][T30747] ? proc_fail_nth_read+0x220/0x220 [ 2839.699065][T30747] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2839.704011][T30747] ? vfs_write+0x9af/0x1050 [ 2839.708350][T30747] ? vmacache_update+0xb7/0x120 [ 2839.713038][T30747] kernel_clone+0x22d/0x990 [ 2839.717375][T30747] ? file_end_write+0x1b0/0x1b0 [ 2839.722063][T30747] ? __kasan_check_write+0x14/0x20 [ 2839.727018][T30747] ? create_io_thread+0x1e0/0x1e0 [ 2839.731869][T30747] ? __mutex_lock_slowpath+0x10/0x10 [ 2839.736991][T30747] __x64_sys_clone+0x289/0x310 [ 2839.741594][T30747] ? __do_sys_vfork+0x130/0x130 [ 2839.746278][T30747] ? debug_smp_processor_id+0x17/0x20 [ 2839.751487][T30747] do_syscall_64+0x44/0xd0 [ 2839.755739][T30747] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2839.761467][T30747] RIP: 0033:0x7f4243ed90d9 [ 2839.765721][T30747] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2839.785160][T30747] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2839.793407][T30747] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2839.801218][T30747] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2839.809027][T30747] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2839.816837][T30747] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 07:41:48 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5) 07:41:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1d3b00000100000074890001080000001800000004e630000000000000004aab4c84bf00001800000085200016c5b5a569c211afa6d7cd45afe50e451708a94268ae9350718b6a5074ee5286b03cf9acd286ffd35c2e33582e2fedfd0d43323c8a277e29fdff61dd227fec6c9c797db61510463e592473bdfcd114e86c3ab15cc75fdbb7a9b9630ea3b0f5bbbd01000080066fe9115a421bf9951b334a1641271914cd3fd2777ee2e396ca62a49f86ee0729fbd8e4413fb75c846d4108af483bf95fcd89e2d6d6893b2a60f63a"], &(0x7f0000000040)='GPL\x00', 0x7, 0xe4, &(0x7f0000000080)=""/228, 0x40f00, 0x17, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xa, 0x2, 0x6}, 0x10, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@cgroup=r2, r3, 0x4}, 0x10) 07:41:48 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000e0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 0: socketpair(0x1f, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000040)=@phonet, 0x80, &(0x7f0000001100)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/42, 0x2a}], 0x2, &(0x7f0000001140)=""/182, 0xb6}, 0x1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:48 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x9, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xfb}], &(0x7f0000000040)='GPL\x00', 0x3d0, 0x45, &(0x7f0000000080)=""/69, 0x40f00, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000100)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x8, 0x6, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1, 0xffffffffffffffff, 0x1, r2, r3]}, 0x80) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x9, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xfb}], &(0x7f0000000040)='GPL\x00', 0x3d0, 0x45, &(0x7f0000000080)=""/69, 0x40f00, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000100)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x8, 0x6, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1, 0xffffffffffffffff, 0x1, r2, r3]}, 0x80) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) 07:41:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1d3b00000100000074890001080000001800000004e630000000000000004aab4c84bf00001800000085200016c5b5a569c211afa6d7cd45afe50e451708a94268ae9350718b6a5074ee5286b03cf9acd286ffd35c2e33582e2fedfd0d43323c8a277e29fdff61dd227fec6c9c797db61510463e592473bdfcd114e86c3ab15cc75fdbb7a9b9630ea3b0f5bbbd01000080066fe9115a421bf9951b334a1641271914cd3fd2777ee2e396ca62a49f86ee0729fbd8e4413fb75c846d4108af483bf95fcd89e2d6d6893b2a60f63a"], &(0x7f0000000040)='GPL\x00', 0x7, 0xe4, &(0x7f0000000080)=""/228, 0x40f00, 0x17, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xa, 0x2, 0x6}, 0x10, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@cgroup=r2, r3, 0x4}, 0x10) [ 2839.824651][T30747] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2839.832463][T30747] 07:41:48 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000f0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x7, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1d3b00000100000074890001080000001800000004e630000000000000004aab4c84bf00001800000085200016c5b5a569c211afa6d7cd45afe50e451708a94268ae9350718b6a5074ee5286b03cf9acd286ffd35c2e33582e2fedfd0d43323c8a277e29fdff61dd227fec6c9c797db61510463e592473bdfcd114e86c3ab15cc75fdbb7a9b9630ea3b0f5bbbd01000080066fe9115a421bf9951b334a1641271914cd3fd2777ee2e396ca62a49f86ee0729fbd8e4413fb75c846d4108af483bf95fcd89e2d6d6893b2a60f63a"], &(0x7f0000000040)='GPL\x00', 0x7, 0xe4, &(0x7f0000000080)=""/228, 0x40f00, 0x17, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xa, 0x2, 0x6}, 0x10, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@cgroup=r2, r3, 0x4}, 0x10) 07:41:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000000000000001000018230000", @ANYRES32=r0, @ANYBLOB="00000000050000008510000005000000182a0000", @ANYRES32=r1, @ANYBLOB="00000000960300001842000004000000000000000000000095000000000000000762ff00410000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) [ 2839.867622][T30773] FAULT_INJECTION: forcing a failure. [ 2839.867622][T30773] name failslab, interval 1, probability 0, space 0, times 0 [ 2839.896442][T30773] CPU: 1 PID: 30773 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2839.906513][T30773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 07:41:48 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x9, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xfb}], &(0x7f0000000040)='GPL\x00', 0x3d0, 0x45, &(0x7f0000000080)=""/69, 0x40f00, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000100)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x8, 0x6, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1, 0xffffffffffffffff, 0x1, r2, r3]}, 0x80) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) [ 2839.916412][T30773] Call Trace: [ 2839.919534][T30773] [ 2839.922313][T30773] dump_stack_lvl+0x151/0x1b7 [ 2839.926826][T30773] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2839.932114][T30773] ? xas_nomem+0x19e/0x1e0 [ 2839.936370][T30773] dump_stack+0x15/0x17 [ 2839.940359][T30773] should_fail+0x3c0/0x510 [ 2839.944610][T30773] ? setup_userns_sysctls+0x55/0x340 [ 2839.949731][T30773] __should_failslab+0x9f/0xe0 [ 2839.954331][T30773] should_failslab+0x9/0x20 [ 2839.958670][T30773] __kmalloc_track_caller+0x6c/0x350 [ 2839.963791][T30773] ? setup_userns_sysctls+0x340/0x340 [ 2839.969000][T30773] kmemdup+0x24/0x50 [ 2839.972732][T30773] setup_userns_sysctls+0x55/0x340 [ 2839.977680][T30773] create_user_ns+0x1227/0x19b0 [ 2839.982369][T30773] ? utsns_owner+0x40/0x40 [ 2839.986620][T30773] ? security_prepare_creds+0x149/0x160 [ 2839.991999][T30773] ? prepare_creds+0x485/0x690 [ 2839.996598][T30773] copy_creds+0x200/0x640 [ 2840.000767][T30773] copy_process+0x775/0x3250 [ 2840.005193][T30773] ? __kasan_check_write+0x14/0x20 [ 2840.010138][T30773] ? proc_fail_nth_write+0x213/0x290 [ 2840.015262][T30773] ? proc_fail_nth_read+0x220/0x220 [ 2840.020297][T30773] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2840.025242][T30773] ? vfs_write+0x9af/0x1050 [ 2840.029581][T30773] ? vmacache_update+0xb7/0x120 [ 2840.034278][T30773] kernel_clone+0x22d/0x990 [ 2840.038606][T30773] ? file_end_write+0x1b0/0x1b0 [ 2840.043295][T30773] ? __kasan_check_write+0x14/0x20 [ 2840.048241][T30773] ? create_io_thread+0x1e0/0x1e0 [ 2840.053100][T30773] ? __mutex_lock_slowpath+0x10/0x10 [ 2840.058221][T30773] __x64_sys_clone+0x289/0x310 [ 2840.062822][T30773] ? __do_sys_vfork+0x130/0x130 [ 2840.067509][T30773] ? debug_smp_processor_id+0x17/0x20 [ 2840.072716][T30773] do_syscall_64+0x44/0xd0 [ 2840.076967][T30773] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2840.082696][T30773] RIP: 0033:0x7f4243ed90d9 [ 2840.086951][T30773] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2840.106398][T30773] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 07:41:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080), 0x4) close(r0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='rxrpc_improper_term\x00', r2}, 0x10) r4 = perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x2}, 0x4012, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, r3, 0x0) close(r4) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) 07:41:48 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000000000000001000018230000", @ANYRES32=r0, @ANYBLOB="00000000050000008510000005000000182a0000", @ANYRES32=r1, @ANYBLOB="00000000960300001842000004000000000000000000000095000000000000000762ff00410000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:48 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 6) 07:41:48 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000110000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x8000, 0x20, 0x4, 0xb64}, {0x40, 0x3d, 0x4, 0x1}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000100)=0xe) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x1ff) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) [ 2840.114634][T30773] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2840.122445][T30773] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2840.130260][T30773] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2840.138070][T30773] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2840.145879][T30773] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2840.153692][T30773] 07:41:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000000000000001000018230000", @ANYRES32=r0, @ANYBLOB="00000000050000008510000005000000182a0000", @ANYRES32=r1, @ANYBLOB="00000000960300001842000004000000000000000000000095000000000000000762ff00410000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:48 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000120000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async, rerun: 64) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (rerun: 64) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080), 0x4) close(r0) (async) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='rxrpc_improper_term\x00', r2}, 0x10) (async) r4 = perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x2}, 0x4012, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, r3, 0x0) close(r4) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) [ 2840.182375][T30822] FAULT_INJECTION: forcing a failure. [ 2840.182375][T30822] name failslab, interval 1, probability 0, space 0, times 0 [ 2840.195067][T30822] CPU: 1 PID: 30822 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2840.205120][T30822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2840.215024][T30822] Call Trace: [ 2840.218138][T30822] [ 2840.220918][T30822] dump_stack_lvl+0x151/0x1b7 [ 2840.225430][T30822] ? bfq_pos_tree_add_move+0x43e/0x43e 07:41:48 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000180000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xa, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2840.230725][T30822] dump_stack+0x15/0x17 [ 2840.234716][T30822] should_fail+0x3c0/0x510 [ 2840.238971][T30822] ? __register_sysctl_table+0xee/0x1330 [ 2840.244436][T30822] __should_failslab+0x9f/0xe0 [ 2840.249036][T30822] should_failslab+0x9/0x20 [ 2840.253375][T30822] __kmalloc+0x6d/0x350 [ 2840.257370][T30822] __register_sysctl_table+0xee/0x1330 [ 2840.262662][T30822] ? __kmalloc_track_caller+0x202/0x350 [ 2840.268043][T30822] ? kmemdup+0x3f/0x50 [ 2840.271948][T30822] ? memcpy+0x56/0x70 [ 2840.275769][T30822] setup_userns_sysctls+0x2b1/0x340 [ 2840.280803][T30822] create_user_ns+0x1227/0x19b0 [ 2840.285493][T30822] ? utsns_owner+0x40/0x40 [ 2840.289742][T30822] ? security_prepare_creds+0x149/0x160 [ 2840.295121][T30822] ? prepare_creds+0x485/0x690 [ 2840.299721][T30822] copy_creds+0x200/0x640 [ 2840.303887][T30822] copy_process+0x775/0x3250 [ 2840.308313][T30822] ? __kasan_check_write+0x14/0x20 [ 2840.313257][T30822] ? proc_fail_nth_write+0x213/0x290 [ 2840.318379][T30822] ? proc_fail_nth_read+0x220/0x220 [ 2840.323412][T30822] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2840.328361][T30822] ? vfs_write+0x9af/0x1050 [ 2840.332697][T30822] ? vmacache_update+0xb7/0x120 [ 2840.337385][T30822] kernel_clone+0x22d/0x990 [ 2840.341727][T30822] ? file_end_write+0x1b0/0x1b0 [ 2840.346413][T30822] ? __kasan_check_write+0x14/0x20 [ 2840.351358][T30822] ? create_io_thread+0x1e0/0x1e0 [ 2840.356222][T30822] ? __mutex_lock_slowpath+0x10/0x10 [ 2840.361342][T30822] __x64_sys_clone+0x289/0x310 [ 2840.365939][T30822] ? __do_sys_vfork+0x130/0x130 [ 2840.370627][T30822] ? debug_smp_processor_id+0x17/0x20 [ 2840.375835][T30822] do_syscall_64+0x44/0xd0 [ 2840.380088][T30822] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2840.385816][T30822] RIP: 0033:0x7f4243ed90d9 [ 2840.390071][T30822] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2840.409514][T30822] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2840.417842][T30822] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2840.425653][T30822] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 07:41:48 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 7) 07:41:48 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000001f0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}}, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000000080)=""/189, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0xb2) 07:41:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080), 0x4) close(r0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='rxrpc_improper_term\x00', r2}, 0x10) r4 = perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x2}, 0x4012, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, r3, 0x0) close(r4) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080), 0x4) (async) close(r0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='rxrpc_improper_term\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x2}, 0x4012, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, r3, 0x0) (async) close(r4) (async) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) (async) 07:41:48 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1001, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x8000, 0x20, 0x4, 0xb64}, {0x40, 0x3d, 0x4, 0x1}]}) (async) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) (async, rerun: 32) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000100)=0xe) (rerun: 32) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x1ff) (async, rerun: 64) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (rerun: 64) [ 2840.433463][T30822] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2840.441278][T30822] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2840.449088][T30822] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2840.456901][T30822] [ 2840.473668][T30840] FAULT_INJECTION: forcing a failure. 07:41:48 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000200000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) (async) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r2) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}}, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000000080)=""/189, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0xb2) (rerun: 32) 07:41:48 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3d3, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) close(r2) close(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0x1, &(0x7f0000000040)="d88999ea2067781b7e1d02bacb9073ef71418a6798c5f6326b05452c9a3f63c355ebff51adc163a72487c30ce2ff8ff52f10463d15533d97a31bf047b872e3079d1aba7737b9f2181bc978cb606be85a27e24e1c65aa98c146dd81b94ed882e0317d9c9c7de02b377a510ac2", &(0x7f00000000c0)=""/193, 0x4}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f0000000240)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0xfffffffffffffed2, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r4, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r4, r2}, 0xc) 07:41:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3d3, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) (async) close(r2) (async) close(r0) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0x1, &(0x7f0000000040)="d88999ea2067781b7e1d02bacb9073ef71418a6798c5f6326b05452c9a3f63c355ebff51adc163a72487c30ce2ff8ff52f10463d15533d97a31bf047b872e3079d1aba7737b9f2181bc978cb606be85a27e24e1c65aa98c146dd81b94ed882e0317d9c9c7de02b377a510ac2", &(0x7f00000000c0)=""/193, 0x4}, 0x20) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f0000000240)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0xfffffffffffffed2, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r4, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r4, r2}, 0xc) [ 2840.473668][T30840] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2840.496490][T30840] CPU: 1 PID: 30840 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2840.506550][T30840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2840.516446][T30840] Call Trace: [ 2840.519569][T30840] [ 2840.522346][T30840] dump_stack_lvl+0x151/0x1b7 [ 2840.526861][T30840] ? bfq_pos_tree_add_move+0x43e/0x43e 07:41:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3d3, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) close(r2) close(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0x1, &(0x7f0000000040)="d88999ea2067781b7e1d02bacb9073ef71418a6798c5f6326b05452c9a3f63c355ebff51adc163a72487c30ce2ff8ff52f10463d15533d97a31bf047b872e3079d1aba7737b9f2181bc978cb606be85a27e24e1c65aa98c146dd81b94ed882e0317d9c9c7de02b377a510ac2", &(0x7f00000000c0)=""/193, 0x4}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f0000000240)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0xfffffffffffffed2, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r4, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r4, r2}, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) close(r1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3d3, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) (async) close(r2) (async) close(r0) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0x1, &(0x7f0000000040)="d88999ea2067781b7e1d02bacb9073ef71418a6798c5f6326b05452c9a3f63c355ebff51adc163a72487c30ce2ff8ff52f10463d15533d97a31bf047b872e3079d1aba7737b9f2181bc978cb606be85a27e24e1c65aa98c146dd81b94ed882e0317d9c9c7de02b377a510ac2", &(0x7f00000000c0)=""/193, 0x4}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f0000000240)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0xfffffffffffffed2, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r4, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r4, r2}, 0xc) (async) [ 2840.532157][T30840] dump_stack+0x15/0x17 [ 2840.536146][T30840] should_fail+0x3c0/0x510 [ 2840.540400][T30840] should_fail_alloc_page+0x58/0x70 [ 2840.545436][T30840] __alloc_pages+0x1de/0x7c0 [ 2840.549862][T30840] ? __count_vm_events+0x30/0x30 [ 2840.554636][T30840] ? __kasan_kmalloc+0x9/0x10 [ 2840.559145][T30840] ? __kmalloc+0x203/0x350 [ 2840.563398][T30840] ? __vmalloc_node_range+0x2e3/0x800 [ 2840.568608][T30840] __vmalloc_node_range+0x48f/0x800 [ 2840.573647][T30840] dup_task_struct+0x61f/0xa60 [ 2840.578242][T30840] ? copy_process+0x579/0x3250 [ 2840.582837][T30840] ? __kasan_check_write+0x14/0x20 [ 2840.587789][T30840] copy_process+0x579/0x3250 [ 2840.592221][T30840] ? __kasan_check_write+0x14/0x20 [ 2840.597163][T30840] ? proc_fail_nth_write+0x213/0x290 [ 2840.602282][T30840] ? proc_fail_nth_read+0x220/0x220 [ 2840.607312][T30840] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2840.612259][T30840] ? vfs_write+0x9af/0x1050 [ 2840.616601][T30840] ? vmacache_update+0xb7/0x120 [ 2840.621292][T30840] kernel_clone+0x22d/0x990 [ 2840.625627][T30840] ? file_end_write+0x1b0/0x1b0 [ 2840.630311][T30840] ? __kasan_check_write+0x14/0x20 [ 2840.635265][T30840] ? create_io_thread+0x1e0/0x1e0 [ 2840.640121][T30840] ? __mutex_lock_slowpath+0x10/0x10 [ 2840.645240][T30840] __x64_sys_clone+0x289/0x310 [ 2840.649839][T30840] ? __do_sys_vfork+0x130/0x130 [ 2840.654526][T30840] ? debug_smp_processor_id+0x17/0x20 [ 2840.659739][T30840] do_syscall_64+0x44/0xd0 [ 2840.663986][T30840] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2840.669713][T30840] RIP: 0033:0x7f4243ed90d9 [ 2840.673966][T30840] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2840.693411][T30840] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2840.701654][T30840] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2840.709469][T30840] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2840.717274][T30840] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2840.725084][T30840] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 07:41:49 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 8) 07:41:49 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'tunl0\x00', 0x600}) close(r0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_devices(r2, &(0x7f0000000040)={'b', ' *:* ', 'wm\x00'}, 0x9) 07:41:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000250000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xd, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}}, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000000080)=""/189, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0xb2) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) (async) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r2) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}}, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000000080)=""/189, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0xb2) (async) [ 2840.732898][T30840] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2840.740712][T30840] [ 2840.765801][T30899] FAULT_INJECTION: forcing a failure. [ 2840.765801][T30899] name failslab, interval 1, probability 0, space 0, times 0 [ 2840.784923][T30899] CPU: 1 PID: 30899 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2840.794982][T30899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2840.804874][T30899] Call Trace: [ 2840.807998][T30899] [ 2840.810781][T30899] dump_stack_lvl+0x151/0x1b7 [ 2840.815291][T30899] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2840.820582][T30899] ? __register_sysctl_table+0x1264/0x1330 [ 2840.826226][T30899] dump_stack+0x15/0x17 [ 2840.830218][T30899] should_fail+0x3c0/0x510 [ 2840.834478][T30899] ? alloc_ucounts+0x161/0x4e0 [ 2840.839076][T30899] __should_failslab+0x9f/0xe0 [ 2840.843672][T30899] should_failslab+0x9/0x20 [ 2840.848009][T30899] kmem_cache_alloc_trace+0x4a/0x310 [ 2840.853130][T30899] ? utsns_owner+0x40/0x40 [ 2840.857385][T30899] alloc_ucounts+0x161/0x4e0 [ 2840.861811][T30899] copy_creds+0x345/0x640 [ 2840.865979][T30899] copy_process+0x775/0x3250 [ 2840.870404][T30899] ? __kasan_check_write+0x14/0x20 [ 2840.875354][T30899] ? proc_fail_nth_write+0x213/0x290 [ 2840.880471][T30899] ? proc_fail_nth_read+0x220/0x220 [ 2840.885507][T30899] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2840.890453][T30899] ? vfs_write+0x9af/0x1050 [ 2840.894790][T30899] ? vmacache_update+0xb7/0x120 [ 2840.899477][T30899] kernel_clone+0x22d/0x990 [ 2840.903817][T30899] ? file_end_write+0x1b0/0x1b0 [ 2840.908505][T30899] ? __kasan_check_write+0x14/0x20 [ 2840.913455][T30899] ? create_io_thread+0x1e0/0x1e0 [ 2840.918310][T30899] ? __mutex_lock_slowpath+0x10/0x10 [ 2840.923434][T30899] __x64_sys_clone+0x289/0x310 [ 2840.928034][T30899] ? __do_sys_vfork+0x130/0x130 [ 2840.932719][T30899] ? debug_smp_processor_id+0x17/0x20 [ 2840.937925][T30899] do_syscall_64+0x44/0xd0 [ 2840.942267][T30899] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2840.947994][T30899] RIP: 0033:0x7f4243ed90d9 [ 2840.952249][T30899] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2840.971687][T30899] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2840.979933][T30899] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2840.987743][T30899] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2840.995554][T30899] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2841.003371][T30899] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2841.011186][T30899] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2841.018995][T30899] 07:41:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1001, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x8000, 0x20, 0x4, 0xb64}, {0x40, 0x3d, 0x4, 0x1}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000100)=0xe) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x1ff) (async, rerun: 64) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (rerun: 64) 07:41:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000003c0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:49 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'tunl0\x00', 0x600}) close(r0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_devices(r2, &(0x7f0000000040)={'b', ' *:* ', 'wm\x00'}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'tunl0\x00', 0x600}) (async) close(r0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) write$cgroup_devices(r2, &(0x7f0000000040)={'b', ' *:* ', 'wm\x00'}, 0x9) (async) 07:41:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:49 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 9) 07:41:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000003f0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2841.176196][T30913] FAULT_INJECTION: forcing a failure. [ 2841.176196][T30913] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2841.193459][T30913] CPU: 0 PID: 30913 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2841.203612][T30913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2841.213510][T30913] Call Trace: [ 2841.216634][T30913] [ 2841.219409][T30913] dump_stack_lvl+0x151/0x1b7 07:41:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000400000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000480000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x12, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2841.223924][T30913] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2841.229223][T30913] dump_stack+0x15/0x17 [ 2841.233212][T30913] should_fail+0x3c0/0x510 [ 2841.237461][T30913] should_fail_alloc_page+0x58/0x70 [ 2841.242495][T30913] __alloc_pages+0x1de/0x7c0 [ 2841.246926][T30913] ? __count_vm_events+0x30/0x30 [ 2841.251696][T30913] ? __kasan_kmalloc+0x9/0x10 [ 2841.256210][T30913] ? __kmalloc+0x203/0x350 [ 2841.260460][T30913] ? __vmalloc_node_range+0x2e3/0x800 [ 2841.265669][T30913] __vmalloc_node_range+0x48f/0x800 [ 2841.270705][T30913] dup_task_struct+0x61f/0xa60 [ 2841.275302][T30913] ? copy_process+0x579/0x3250 [ 2841.279902][T30913] ? __kasan_check_write+0x14/0x20 [ 2841.284858][T30913] copy_process+0x579/0x3250 [ 2841.289278][T30913] ? __kasan_check_write+0x14/0x20 [ 2841.294229][T30913] ? proc_fail_nth_write+0x213/0x290 [ 2841.299341][T30913] ? proc_fail_nth_read+0x220/0x220 [ 2841.304379][T30913] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2841.309322][T30913] ? vfs_write+0x9af/0x1050 [ 2841.313661][T30913] ? vmacache_update+0xb7/0x120 [ 2841.318346][T30913] kernel_clone+0x22d/0x990 [ 2841.322685][T30913] ? file_end_write+0x1b0/0x1b0 [ 2841.327373][T30913] ? __kasan_check_write+0x14/0x20 [ 2841.332319][T30913] ? create_io_thread+0x1e0/0x1e0 [ 2841.337184][T30913] ? __mutex_lock_slowpath+0x10/0x10 [ 2841.342300][T30913] __x64_sys_clone+0x289/0x310 [ 2841.346902][T30913] ? __do_sys_vfork+0x130/0x130 [ 2841.351593][T30913] ? debug_smp_processor_id+0x17/0x20 [ 2841.356795][T30913] do_syscall_64+0x44/0xd0 [ 2841.361047][T30913] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2841.366776][T30913] RIP: 0033:0x7f4243ed90d9 [ 2841.371028][T30913] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2841.390470][T30913] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2841.398714][T30913] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2841.406526][T30913] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2841.414338][T30913] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2841.422149][T30913] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2841.429960][T30913] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2841.437772][T30913] 07:41:49 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x2, 0x13, 0x7f, 0x1, 0x0, 0x9, 0x83310, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x6, 0x80000000, 0x6, 0x0, 0x7, 0x9, 0x0, 0x21d0, 0x0, 0xed}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xe1, 0x8b, 0x20, 0x61, 0x0, 0x708, 0x20, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x800, 0x9, 0x3, 0x6, 0xffffffffffffff47, 0x310, 0x4, 0x0, 0x4}, r0, 0xb, r1, 0x1) 07:41:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000004c0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:49 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'tunl0\x00', 0x600}) close(r0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_devices(r2, &(0x7f0000000040)={'b', ' *:* ', 'wm\x00'}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'tunl0\x00', 0x600}) (async) close(r0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) write$cgroup_devices(r2, &(0x7f0000000040)={'b', ' *:* ', 'wm\x00'}, 0x9) (async) 07:41:49 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 10) 07:41:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:50 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)="a8", 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[], &(0x7f00000015c0)='syzkaller\x00', 0x3f, 0xb0, &(0x7f0000000040)=""/176, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4f, 0x6c00}, 0x45) 07:41:50 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)="a8", 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[], &(0x7f00000015c0)='syzkaller\x00', 0x3f, 0xb0, &(0x7f0000000040)=""/176, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4f, 0x6c00}, 0x45) [ 2841.613675][T30945] FAULT_INJECTION: forcing a failure. [ 2841.613675][T30945] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2841.628209][T30945] CPU: 0 PID: 30945 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2841.638273][T30945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2841.648169][T30945] Call Trace: [ 2841.651290][T30945] [ 2841.654069][T30945] dump_stack_lvl+0x151/0x1b7 [ 2841.658584][T30945] ? bfq_pos_tree_add_move+0x43e/0x43e 07:41:50 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)="a8", 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[], &(0x7f00000015c0)='syzkaller\x00', 0x3f, 0xb0, &(0x7f0000000040)=""/176, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4f, 0x6c00}, 0x45) 07:41:50 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x101, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000006000000000000000600000018000000070000000000000081000000180000008c0e000000000000dcc22e4d18410000fdffffff000000000000000041940001000000001854000001000000000000000000800018470000ffffffff00000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x4c73676f, 0xd, &(0x7f00000000c0)=""/13, 0x41100, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x7, 0x101, 0x5}, 0x10, 0x0, r0, 0x0, &(0x7f00000001c0)=[r1]}, 0x80) 07:41:50 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x101, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000006000000000000000600000018000000070000000000000081000000180000008c0e000000000000dcc22e4d18410000fdffffff000000000000000041940001000000001854000001000000000000000000800018470000ffffffff00000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x4c73676f, 0xd, &(0x7f00000000c0)=""/13, 0x41100, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x7, 0x101, 0x5}, 0x10, 0x0, r0, 0x0, &(0x7f00000001c0)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x101, 0x18}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000006000000000000000600000018000000070000000000000081000000180000008c0e000000000000dcc22e4d18410000fdffffff000000000000000041940001000000001854000001000000000000000000800018470000ffffffff00000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x4c73676f, 0xd, &(0x7f00000000c0)=""/13, 0x41100, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x7, 0x101, 0x5}, 0x10, 0x0, r0, 0x0, &(0x7f00000001c0)=[r1]}, 0x80) (async) [ 2841.663875][T30945] dump_stack+0x15/0x17 [ 2841.667871][T30945] should_fail+0x3c0/0x510 [ 2841.672127][T30945] should_fail_alloc_page+0x58/0x70 [ 2841.677156][T30945] __alloc_pages+0x1de/0x7c0 [ 2841.681587][T30945] ? __count_vm_events+0x30/0x30 [ 2841.686354][T30945] ? __kasan_kmalloc+0x9/0x10 [ 2841.690869][T30945] ? __kmalloc+0x203/0x350 [ 2841.695118][T30945] ? __vmalloc_node_range+0x2e3/0x800 [ 2841.700326][T30945] __vmalloc_node_range+0x48f/0x800 [ 2841.705361][T30945] dup_task_struct+0x61f/0xa60 [ 2841.710073][T30945] ? copy_process+0x579/0x3250 [ 2841.714670][T30945] ? __kasan_check_write+0x14/0x20 [ 2841.719615][T30945] copy_process+0x579/0x3250 [ 2841.724044][T30945] ? __kasan_check_write+0x14/0x20 [ 2841.728988][T30945] ? proc_fail_nth_write+0x213/0x290 [ 2841.734113][T30945] ? proc_fail_nth_read+0x220/0x220 [ 2841.739149][T30945] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2841.744093][T30945] ? vfs_write+0x9af/0x1050 [ 2841.748431][T30945] ? vmacache_update+0xb7/0x120 [ 2841.753119][T30945] kernel_clone+0x22d/0x990 [ 2841.757458][T30945] ? file_end_write+0x1b0/0x1b0 [ 2841.762144][T30945] ? __kasan_check_write+0x14/0x20 [ 2841.767091][T30945] ? create_io_thread+0x1e0/0x1e0 [ 2841.771960][T30945] ? __mutex_lock_slowpath+0x10/0x10 [ 2841.777075][T30945] __x64_sys_clone+0x289/0x310 [ 2841.781675][T30945] ? __do_sys_vfork+0x130/0x130 [ 2841.786359][T30945] ? debug_smp_processor_id+0x17/0x20 [ 2841.791567][T30945] do_syscall_64+0x44/0xd0 [ 2841.795820][T30945] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2841.801545][T30945] RIP: 0033:0x7f4243ed90d9 [ 2841.805800][T30945] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2841.825241][T30945] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2841.833484][T30945] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2841.841300][T30945] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2841.849107][T30945] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2841.856921][T30945] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:41:50 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x2, 0x13, 0x7f, 0x1, 0x0, 0x9, 0x83310, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x6, 0x80000000, 0x6, 0x0, 0x7, 0x9, 0x0, 0x21d0, 0x0, 0xed}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xe1, 0x8b, 0x20, 0x61, 0x0, 0x708, 0x20, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x800, 0x9, 0x3, 0x6, 0xffffffffffffff47, 0x310, 0x4, 0x0, 0x4}, r0, 0xb, r1, 0x1) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) getpid() (async) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x2, 0x13, 0x7f, 0x1, 0x0, 0x9, 0x83310, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x6, 0x80000000, 0x6, 0x0, 0x7, 0x9, 0x0, 0x21d0, 0x0, 0xed}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xe1, 0x8b, 0x20, 0x61, 0x0, 0x708, 0x20, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x800, 0x9, 0x3, 0x6, 0xffffffffffffff47, 0x310, 0x4, 0x0, 0x4}, r0, 0xb, r1, 0x1) (async) 07:41:50 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x101, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000006000000000000000600000018000000070000000000000081000000180000008c0e000000000000dcc22e4d18410000fdffffff000000000000000041940001000000001854000001000000000000000000800018470000ffffffff00000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x4c73676f, 0xd, &(0x7f00000000c0)=""/13, 0x41100, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x7, 0x101, 0x5}, 0x10, 0x0, r0, 0x0, &(0x7f00000001c0)=[r1]}, 0x80) 07:41:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x25, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB="180000004000000005000000050000663047abe73caa3a340000020000000000000000000000851000000800000095000000007eb0d3ceb5629e03e6ee931b0e150ae500"/80], &(0x7f0000000080)='GPL\x00', 0x7, 0xe2, &(0x7f00000000c0)=""/226, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xc, 0x1, 0x9}, 0x10}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0xd, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000030000004008000099000000186b00000a000000000000006a0000001946dcfff0ffffff85100900000000000000000002000000950000000000000085000000770000001821d863", @ANYRES32, @ANYBLOB="0000000001000000dd19f0ff090000009500000000000000"], &(0x7f0000000680)='syzkaller\x00', 0x6, 0x2e, &(0x7f00000006c0)=""/46, 0x41000, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x2, 0xb, 0xd9, 0x10000}, 0x10}, 0x80) 07:41:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000610000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 11) 07:41:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000620000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x48, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB="180000004000000005000000050000663047abe73caa3a340000020000000000000000000000851000000800000095000000007eb0d3ceb5629e03e6ee931b0e150ae500"/80], &(0x7f0000000080)='GPL\x00', 0x7, 0xe2, &(0x7f00000000c0)=""/226, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xc, 0x1, 0x9}, 0x10}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0xd, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000030000004008000099000000186b00000a000000000000006a0000001946dcfff0ffffff85100900000000000000000002000000950000000000000085000000770000001821d863", @ANYRES32, @ANYBLOB="0000000001000000dd19f0ff090000009500000000000000"], &(0x7f0000000680)='syzkaller\x00', 0x6, 0x2e, &(0x7f00000006c0)=""/46, 0x41000, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x2, 0xb, 0xd9, 0x10000}, 0x10}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB="180000004000000005000000050000663047abe73caa3a340000020000000000000000000000851000000800000095000000007eb0d3ceb5629e03e6ee931b0e150ae500"/80], &(0x7f0000000080)='GPL\x00', 0x7, 0xe2, &(0x7f00000000c0)=""/226, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xc, 0x1, 0x9}, 0x10}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0xd, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000030000004008000099000000186b00000a000000000000006a0000001946dcfff0ffffff85100900000000000000000002000000950000000000000085000000770000001821d863", @ANYRES32, @ANYBLOB="0000000001000000dd19f0ff090000009500000000000000"], &(0x7f0000000680)='syzkaller\x00', 0x6, 0x2e, &(0x7f00000006c0)=""/46, 0x41000, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x2, 0xb, 0xd9, 0x10000}, 0x10}, 0x80) (async) 07:41:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x4c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2841.864732][T30945] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2841.872546][T30945] 07:41:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000630000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) r0 = getpid() perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x2, 0x13, 0x7f, 0x1, 0x0, 0x9, 0x83310, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x6, 0x80000000, 0x6, 0x0, 0x7, 0x9, 0x0, 0x21d0, 0x0, 0xed}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xe1, 0x8b, 0x20, 0x61, 0x0, 0x708, 0x20, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x800, 0x9, 0x3, 0x6, 0xffffffffffffff47, 0x310, 0x4, 0x0, 0x4}, r0, 0xb, r1, 0x1) 07:41:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x64, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB="180000004000000005000000050000663047abe73caa3a340000020000000000000000000000851000000800000095000000007eb0d3ceb5629e03e6ee931b0e150ae500"/80], &(0x7f0000000080)='GPL\x00', 0x7, 0xe2, &(0x7f00000000c0)=""/226, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xc, 0x1, 0x9}, 0x10}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0xd, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000030000004008000099000000186b00000a000000000000006a0000001946dcfff0ffffff85100900000000000000000002000000950000000000000085000000770000001821d863", @ANYRES32, @ANYBLOB="0000000001000000dd19f0ff090000009500000000000000"], &(0x7f0000000680)='syzkaller\x00', 0x6, 0x2e, &(0x7f00000006c0)=""/46, 0x41000, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x2, 0xb, 0xd9, 0x10000}, 0x10}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB="180000004000000005000000050000663047abe73caa3a340000020000000000000000000000851000000800000095000000007eb0d3ceb5629e03e6ee931b0e150ae500"/80], &(0x7f0000000080)='GPL\x00', 0x7, 0xe2, &(0x7f00000000c0)=""/226, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xc, 0x1, 0x9}, 0x10}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0xd, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000030000004008000099000000186b00000a000000000000006a0000001946dcfff0ffffff85100900000000000000000002000000950000000000000085000000770000001821d863", @ANYRES32, @ANYBLOB="0000000001000000dd19f0ff090000009500000000000000"], &(0x7f0000000680)='syzkaller\x00', 0x6, 0x2e, &(0x7f00000006c0)=""/46, 0x41000, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x2, 0xb, 0xd9, 0x10000}, 0x10}, 0x80) (async) 07:41:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000680000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000690000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2841.955074][T31009] FAULT_INJECTION: forcing a failure. [ 2841.955074][T31009] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2841.992334][T31009] CPU: 0 PID: 31009 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 07:41:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r1) [ 2842.002409][T31009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2842.012301][T31009] Call Trace: [ 2842.015428][T31009] [ 2842.018205][T31009] dump_stack_lvl+0x151/0x1b7 [ 2842.022715][T31009] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2842.028007][T31009] dump_stack+0x15/0x17 [ 2842.031998][T31009] should_fail+0x3c0/0x510 [ 2842.036262][T31009] should_fail_alloc_page+0x58/0x70 [ 2842.041285][T31009] __alloc_pages+0x1de/0x7c0 [ 2842.045714][T31009] ? __count_vm_events+0x30/0x30 [ 2842.050485][T31009] ? __kasan_kmalloc+0x9/0x10 [ 2842.054999][T31009] ? __kmalloc+0x203/0x350 [ 2842.059252][T31009] ? __vmalloc_node_range+0x2e3/0x800 [ 2842.064459][T31009] __vmalloc_node_range+0x48f/0x800 [ 2842.069495][T31009] dup_task_struct+0x61f/0xa60 [ 2842.074091][T31009] ? copy_process+0x579/0x3250 [ 2842.078701][T31009] ? __kasan_check_write+0x14/0x20 [ 2842.083640][T31009] copy_process+0x579/0x3250 [ 2842.088067][T31009] ? __kasan_check_write+0x14/0x20 [ 2842.093012][T31009] ? proc_fail_nth_write+0x213/0x290 [ 2842.098136][T31009] ? proc_fail_nth_read+0x220/0x220 [ 2842.103168][T31009] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2842.108115][T31009] ? vfs_write+0x9af/0x1050 [ 2842.112455][T31009] ? vmacache_update+0xb7/0x120 [ 2842.117144][T31009] kernel_clone+0x22d/0x990 [ 2842.121479][T31009] ? file_end_write+0x1b0/0x1b0 [ 2842.126168][T31009] ? __kasan_check_write+0x14/0x20 [ 2842.131115][T31009] ? create_io_thread+0x1e0/0x1e0 [ 2842.135976][T31009] ? __mutex_lock_slowpath+0x10/0x10 [ 2842.141097][T31009] __x64_sys_clone+0x289/0x310 [ 2842.145957][T31009] ? __do_sys_vfork+0x130/0x130 [ 2842.150643][T31009] ? debug_smp_processor_id+0x17/0x20 [ 2842.155907][T31009] do_syscall_64+0x44/0xd0 [ 2842.160104][T31009] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2842.165833][T31009] RIP: 0033:0x7f4243ed90d9 [ 2842.170086][T31009] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2842.189527][T31009] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2842.197771][T31009] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 07:41:50 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 12) 07:41:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x12, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000080)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x5, 0x3, 0x3ff, 0x9}, 0x10, r1, 0x0, 0x0, &(0x7f0000000100)=[r2, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 07:41:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r1) 07:41:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x68, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 07:41:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000006a0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) close(r1) 07:41:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000006b0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2842.205583][T31009] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2842.213398][T31009] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2842.221204][T31009] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2842.229021][T31009] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2842.236833][T31009] 07:41:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x6c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x12, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000080)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x5, 0x3, 0x3ff, 0x9}, 0x10, r1, 0x0, 0x0, &(0x7f0000000100)=[r2, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x12, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000080)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x5, 0x3, 0x3ff, 0x9}, 0x10, r1, 0x0, 0x0, &(0x7f0000000100)=[r2, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) (async) 07:41:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x74, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2842.279037][T31045] FAULT_INJECTION: forcing a failure. [ 2842.279037][T31045] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2842.298329][T31045] CPU: 1 PID: 31045 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2842.308397][T31045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2842.318290][T31045] Call Trace: [ 2842.321417][T31045] [ 2842.324192][T31045] dump_stack_lvl+0x151/0x1b7 07:41:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000006c0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2842.328706][T31045] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2842.334003][T31045] dump_stack+0x15/0x17 [ 2842.337990][T31045] should_fail+0x3c0/0x510 [ 2842.342243][T31045] should_fail_alloc_page+0x58/0x70 [ 2842.347275][T31045] __alloc_pages+0x1de/0x7c0 [ 2842.351703][T31045] ? __count_vm_events+0x30/0x30 [ 2842.356473][T31045] ? __kasan_kmalloc+0x9/0x10 [ 2842.360988][T31045] ? __kmalloc+0x203/0x350 [ 2842.365238][T31045] ? __vmalloc_node_range+0x2e3/0x800 [ 2842.370447][T31045] __vmalloc_node_range+0x48f/0x800 [ 2842.375485][T31045] dup_task_struct+0x61f/0xa60 [ 2842.380083][T31045] ? copy_process+0x579/0x3250 [ 2842.384681][T31045] ? __kasan_check_write+0x14/0x20 [ 2842.389629][T31045] copy_process+0x579/0x3250 [ 2842.394055][T31045] ? __kasan_check_write+0x14/0x20 [ 2842.399003][T31045] ? proc_fail_nth_write+0x213/0x290 [ 2842.404125][T31045] ? proc_fail_nth_read+0x220/0x220 [ 2842.409159][T31045] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2842.414107][T31045] ? vfs_write+0x9af/0x1050 [ 2842.418443][T31045] ? vmacache_update+0xb7/0x120 [ 2842.423129][T31045] kernel_clone+0x22d/0x990 [ 2842.427473][T31045] ? file_end_write+0x1b0/0x1b0 [ 2842.432156][T31045] ? __kasan_check_write+0x14/0x20 [ 2842.437102][T31045] ? create_io_thread+0x1e0/0x1e0 [ 2842.441964][T31045] ? __mutex_lock_slowpath+0x10/0x10 [ 2842.447084][T31045] __x64_sys_clone+0x289/0x310 [ 2842.451686][T31045] ? __do_sys_vfork+0x130/0x130 [ 2842.456372][T31045] ? debug_smp_processor_id+0x17/0x20 [ 2842.461579][T31045] do_syscall_64+0x44/0xd0 [ 2842.465830][T31045] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2842.471558][T31045] RIP: 0033:0x7f4243ed90d9 [ 2842.475811][T31045] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2842.495257][T31045] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2842.503497][T31045] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2842.511310][T31045] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2842.519118][T31045] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:41:50 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 13) 07:41:50 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) (async) 07:41:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x12, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000080)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x5, 0x3, 0x3ff, 0x9}, 0x10, r1, 0x0, 0x0, &(0x7f0000000100)=[r2, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x12, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000080)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x5, 0x3, 0x3ff, 0x9}, 0x10, r1, 0x0, 0x0, &(0x7f0000000100)=[r2, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) (async) 07:41:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000710000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x7a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r1) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)='cpu.pressure\x00', 0x2, 0x0) close(r0) 07:41:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000037037f4f493ac0214a33db0000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000080)=""/175, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) 07:41:50 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) (async) [ 2842.526932][T31045] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2842.534750][T31045] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2842.542556][T31045] [ 2842.564200][T31081] FAULT_INJECTION: forcing a failure. [ 2842.564200][T31081] name failslab, interval 1, probability 0, space 0, times 0 07:41:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xb0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000720000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r1) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)='cpu.pressure\x00', 0x2, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) close(r1) (async) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)='cpu.pressure\x00', 0x2, 0x0) (async) close(r0) (async) 07:41:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xdd, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2842.579623][T31081] CPU: 1 PID: 31081 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2842.589678][T31081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2842.599572][T31081] Call Trace: [ 2842.602695][T31081] [ 2842.605475][T31081] dump_stack_lvl+0x151/0x1b7 [ 2842.609987][T31081] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2842.615282][T31081] dump_stack+0x15/0x17 [ 2842.619273][T31081] should_fail+0x3c0/0x510 [ 2842.623528][T31081] ? kvmalloc_node+0x82/0x130 [ 2842.628037][T31081] __should_failslab+0x9f/0xe0 [ 2842.632638][T31081] should_failslab+0x9/0x20 [ 2842.636976][T31081] __kmalloc+0x6d/0x350 [ 2842.640971][T31081] ? kvmalloc_node+0x82/0x130 [ 2842.645481][T31081] kvmalloc_node+0x82/0x130 [ 2842.649825][T31081] alloc_fdtable+0x173/0x2b0 [ 2842.654251][T31081] dup_fd+0x781/0xa40 [ 2842.658068][T31081] ? avc_has_perm+0x16d/0x260 [ 2842.662585][T31081] copy_files+0xe6/0x200 [ 2842.666662][T31081] ? perf_event_attrs+0x30/0x30 [ 2842.671355][T31081] ? dup_task_struct+0xa60/0xa60 [ 2842.676117][T31081] ? security_task_alloc+0x132/0x150 [ 2842.681240][T31081] copy_process+0x11e9/0x3250 [ 2842.685751][T31081] ? proc_fail_nth_write+0x213/0x290 [ 2842.690871][T31081] ? proc_fail_nth_read+0x220/0x220 [ 2842.695904][T31081] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2842.700851][T31081] ? vfs_write+0x9af/0x1050 [ 2842.705191][T31081] ? vmacache_update+0xb7/0x120 [ 2842.709880][T31081] kernel_clone+0x22d/0x990 [ 2842.714219][T31081] ? file_end_write+0x1b0/0x1b0 [ 2842.718904][T31081] ? __kasan_check_write+0x14/0x20 [ 2842.723851][T31081] ? create_io_thread+0x1e0/0x1e0 [ 2842.728717][T31081] ? __mutex_lock_slowpath+0x10/0x10 [ 2842.733834][T31081] __x64_sys_clone+0x289/0x310 [ 2842.738433][T31081] ? __do_sys_vfork+0x130/0x130 [ 2842.743121][T31081] ? debug_smp_processor_id+0x17/0x20 [ 2842.748329][T31081] do_syscall_64+0x44/0xd0 [ 2842.752582][T31081] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2842.758308][T31081] RIP: 0033:0x7f4243ed90d9 [ 2842.762562][T31081] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2842.782000][T31081] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2842.790247][T31081] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2842.798058][T31081] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2842.805867][T31081] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2842.813680][T31081] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2842.821489][T31081] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 07:41:51 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 14) 07:41:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) (async) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r1) (async) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)='cpu.pressure\x00', 0x2, 0x0) (async) close(r0) 07:41:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000730000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xf0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000037037f4f493ac0214a33db0000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000080)=""/175, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) 07:41:51 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) syz_clone(0x3a0b8500, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r1) close(r0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) 07:41:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000740000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000790000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000037037f4f493ac0214a33db0000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000080)=""/175, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000037037f4f493ac0214a33db0000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000080)=""/175, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) (async) 07:41:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r1) close(r0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) close(r1) (async) close(r0) (async) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) (async) [ 2842.829304][T31081] [ 2842.849641][T31104] FAULT_INJECTION: forcing a failure. [ 2842.849641][T31104] name fail_page_alloc, interval 1, probability 0, space 0, times 0 07:41:51 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x105, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2842.882610][T31104] CPU: 1 PID: 31104 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2842.892675][T31104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2842.902574][T31104] Call Trace: [ 2842.905697][T31104] [ 2842.908473][T31104] dump_stack_lvl+0x151/0x1b7 [ 2842.912986][T31104] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2842.918281][T31104] dump_stack+0x15/0x17 [ 2842.922273][T31104] should_fail+0x3c0/0x510 [ 2842.926526][T31104] should_fail_alloc_page+0x58/0x70 [ 2842.931560][T31104] __alloc_pages+0x1de/0x7c0 [ 2842.935986][T31104] ? __count_vm_events+0x30/0x30 [ 2842.940757][T31104] ? __kasan_kmalloc+0x9/0x10 [ 2842.945270][T31104] ? __kmalloc+0x203/0x350 [ 2842.949520][T31104] ? __vmalloc_node_range+0x2e3/0x800 [ 2842.954727][T31104] __vmalloc_node_range+0x48f/0x800 [ 2842.959762][T31104] dup_task_struct+0x61f/0xa60 [ 2842.964364][T31104] ? copy_process+0x579/0x3250 [ 2842.968962][T31104] ? __kasan_check_write+0x14/0x20 [ 2842.973908][T31104] copy_process+0x579/0x3250 [ 2842.978340][T31104] ? __kasan_check_write+0x14/0x20 [ 2842.983285][T31104] ? proc_fail_nth_write+0x213/0x290 [ 2842.988403][T31104] ? proc_fail_nth_read+0x220/0x220 [ 2842.993440][T31104] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2842.998384][T31104] ? vfs_write+0x9af/0x1050 [ 2843.002723][T31104] ? vmacache_update+0xb7/0x120 [ 2843.007410][T31104] kernel_clone+0x22d/0x990 [ 2843.011748][T31104] ? file_end_write+0x1b0/0x1b0 [ 2843.016437][T31104] ? __kasan_check_write+0x14/0x20 [ 2843.021383][T31104] ? create_io_thread+0x1e0/0x1e0 [ 2843.026246][T31104] ? __mutex_lock_slowpath+0x10/0x10 [ 2843.031363][T31104] __x64_sys_clone+0x289/0x310 [ 2843.035966][T31104] ? __do_sys_vfork+0x130/0x130 [ 2843.040651][T31104] ? debug_smp_processor_id+0x17/0x20 [ 2843.045860][T31104] do_syscall_64+0x44/0xd0 [ 2843.050112][T31104] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2843.055840][T31104] RIP: 0033:0x7f4243ed90d9 [ 2843.060093][T31104] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:41:51 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 15) 07:41:51 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x166, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) (async) syz_clone(0x3a0b8500, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000007a0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r1) close(r0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) close(r1) (async) close(r0) (async) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) (async) 07:41:51 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) syz_clone(0x3a0b8500, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) [ 2843.079537][T31104] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2843.087778][T31104] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2843.095590][T31104] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2843.103400][T31104] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2843.111210][T31104] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2843.119023][T31104] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2843.126837][T31104] 07:41:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x1}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0xd}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x7f}]}, &(0x7f00000007c0)='GPL\x00', 0x4, 0x7a, &(0x7f0000000980)=""/122, 0x41000, 0x4, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000a00)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x3, 0xd, 0x1, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b00)=[r1, r1, r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1c, 0x3, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0xf8, &(0x7f0000000880)=""/248, 0x40f00, 0x1e, '\x00', 0x0, 0x21, r3, 0x8, &(0x7f0000000500)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x2, 0x7, 0x400}, 0x10, r4, r5, 0x0, &(0x7f0000000bc0)=[r1, r1]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0xc}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @map_fd={0x18, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x1f, 0x96, &(0x7f00000000c0)=""/150, 0x41100, 0x2, '\x00', 0x0, 0x11, r0, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x8, 0x100, 0x5}, 0x10, 0x83f4, r2, 0x0, &(0x7f0000000340)=[r6, r7]}, 0x80) 07:41:51 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x195, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000007b0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 32) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) (async) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x1}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0xd}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x7f}]}, &(0x7f00000007c0)='GPL\x00', 0x4, 0x7a, &(0x7f0000000980)=""/122, 0x41000, 0x4, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000a00)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x3, 0xd, 0x1, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b00)=[r1, r1, r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1c, 0x3, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0xf8, &(0x7f0000000880)=""/248, 0x40f00, 0x1e, '\x00', 0x0, 0x21, r3, 0x8, &(0x7f0000000500)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x2, 0x7, 0x400}, 0x10, r4, r5, 0x0, &(0x7f0000000bc0)=[r1, r1]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0xc}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @map_fd={0x18, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x1f, 0x96, &(0x7f00000000c0)=""/150, 0x41100, 0x2, '\x00', 0x0, 0x11, r0, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x8, 0x100, 0x5}, 0x10, 0x83f4, r2, 0x0, &(0x7f0000000340)=[r6, r7]}, 0x80) 07:41:51 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 07:41:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) [ 2843.159609][T31140] FAULT_INJECTION: forcing a failure. [ 2843.159609][T31140] name failslab, interval 1, probability 0, space 0, times 0 [ 2843.198512][T31140] CPU: 0 PID: 31140 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2843.208579][T31140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2843.218474][T31140] Call Trace: [ 2843.221596][T31140] [ 2843.224373][T31140] dump_stack_lvl+0x151/0x1b7 [ 2843.228888][T31140] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2843.234178][T31140] dump_stack+0x15/0x17 [ 2843.238172][T31140] should_fail+0x3c0/0x510 [ 2843.242425][T31140] __should_failslab+0x9f/0xe0 [ 2843.247027][T31140] should_failslab+0x9/0x20 [ 2843.251364][T31140] kmem_cache_alloc+0x4f/0x2f0 [ 2843.255963][T31140] ? copy_signal+0x55/0x610 [ 2843.260302][T31140] copy_signal+0x55/0x610 [ 2843.264467][T31140] copy_process+0x126a/0x3250 [ 2843.268983][T31140] ? proc_fail_nth_write+0x213/0x290 [ 2843.274105][T31140] ? proc_fail_nth_read+0x220/0x220 [ 2843.279143][T31140] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2843.284084][T31140] ? vfs_write+0x9af/0x1050 [ 2843.288423][T31140] ? vmacache_update+0xb7/0x120 [ 2843.293110][T31140] kernel_clone+0x22d/0x990 [ 2843.297448][T31140] ? file_end_write+0x1b0/0x1b0 [ 2843.302137][T31140] ? __kasan_check_write+0x14/0x20 [ 2843.307086][T31140] ? create_io_thread+0x1e0/0x1e0 [ 2843.311946][T31140] ? __mutex_lock_slowpath+0x10/0x10 [ 2843.317067][T31140] __x64_sys_clone+0x289/0x310 [ 2843.321665][T31140] ? __do_sys_vfork+0x130/0x130 [ 2843.326355][T31140] ? debug_smp_processor_id+0x17/0x20 [ 2843.331559][T31140] do_syscall_64+0x44/0xd0 [ 2843.335814][T31140] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2843.341538][T31140] RIP: 0033:0x7f4243ed90d9 [ 2843.345793][T31140] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2843.365232][T31140] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2843.373479][T31140] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2843.381290][T31140] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2843.389100][T31140] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2843.396911][T31140] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:41:51 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 16) 07:41:51 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x198, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async, rerun: 32) close(r0) (rerun: 32) 07:41:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000001950000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async, rerun: 64) r0 = getpid() (rerun: 64) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 07:41:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x1}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0xd}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x7f}]}, &(0x7f00000007c0)='GPL\x00', 0x4, 0x7a, &(0x7f0000000980)=""/122, 0x41000, 0x4, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000a00)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x3, 0xd, 0x1, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b00)=[r1, r1, r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1c, 0x3, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0xf8, &(0x7f0000000880)=""/248, 0x40f00, 0x1e, '\x00', 0x0, 0x21, r3, 0x8, &(0x7f0000000500)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x2, 0x7, 0x400}, 0x10, r4, r5, 0x0, &(0x7f0000000bc0)=[r1, r1]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0xc}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @map_fd={0x18, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x1f, 0x96, &(0x7f00000000c0)=""/150, 0x41100, 0x2, '\x00', 0x0, 0x11, r0, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x8, 0x100, 0x5}, 0x10, 0x83f4, r2, 0x0, &(0x7f0000000340)=[r6, r7]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x1}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0xd}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x7f}]}, &(0x7f00000007c0)='GPL\x00', 0x4, 0x7a, &(0x7f0000000980)=""/122, 0x41000, 0x4, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000a00)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x3, 0xd, 0x1, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b00)=[r1, r1, r1]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1c, 0x3, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0xf8, &(0x7f0000000880)=""/248, 0x40f00, 0x1e, '\x00', 0x0, 0x21, r3, 0x8, &(0x7f0000000500)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x2, 0x7, 0x400}, 0x10, r4, r5, 0x0, &(0x7f0000000bc0)=[r1, r1]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0xc}, 0x10) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @map_fd={0x18, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x1f, 0x96, &(0x7f00000000c0)=""/150, 0x41100, 0x2, '\x00', 0x0, 0x11, r0, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x8, 0x100, 0x5}, 0x10, 0x83f4, r2, 0x0, &(0x7f0000000340)=[r6, r7]}, 0x80) (async) 07:41:51 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x209, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2843.404724][T31140] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2843.412535][T31140] 07:41:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) close(r1) (async) close(r0) (async) 07:41:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="f8cb00000004000000fffffffff6000095000000000000006599bffe3518caed08ea27ad484a525d8bc6e2a6ce57d7019f66ed1525c5be32795be2a2ca1629b44961035d9b3d4f8f4c1e0b967b6147dec51b71cf9efa4add16c2afb6c0c68ce9263dce935f63bbf63b180e6c7f3a120d4d0347487851f194571852462b000eafa9017f"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000001980000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x299, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="f8cb00000004000000fffffffff6000095000000000000006599bffe3518caed08ea27ad484a525d8bc6e2a6ce57d7019f66ed1525c5be32795be2a2ca1629b44961035d9b3d4f8f4c1e0b967b6147dec51b71cf9efa4add16c2afb6c0c68ce9263dce935f63bbf63b180e6c7f3a120d4d0347487851f194571852462b000eafa9017f"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) [ 2843.470011][T31194] FAULT_INJECTION: forcing a failure. [ 2843.470011][T31194] name failslab, interval 1, probability 0, space 0, times 0 [ 2843.491249][T31194] CPU: 1 PID: 31194 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2843.501317][T31194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2843.511211][T31194] Call Trace: [ 2843.514338][T31194] [ 2843.517112][T31194] dump_stack_lvl+0x151/0x1b7 [ 2843.521623][T31194] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2843.526921][T31194] ? __this_cpu_preempt_check+0x13/0x20 [ 2843.532305][T31194] dump_stack+0x15/0x17 [ 2843.536289][T31194] should_fail+0x3c0/0x510 [ 2843.540545][T31194] __should_failslab+0x9f/0xe0 [ 2843.545142][T31194] should_failslab+0x9/0x20 [ 2843.549483][T31194] kmem_cache_alloc+0x4f/0x2f0 [ 2843.554081][T31194] ? __kasan_check_write+0x14/0x20 [ 2843.559031][T31194] ? prepare_creds+0x30/0x690 [ 2843.563541][T31194] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 2843.568837][T31194] prepare_creds+0x30/0x690 [ 2843.573175][T31194] copy_creds+0xde/0x640 [ 2843.577255][T31194] copy_process+0x775/0x3250 [ 2843.581681][T31194] ? __kasan_check_write+0x14/0x20 [ 2843.586632][T31194] ? proc_fail_nth_write+0x213/0x290 [ 2843.591751][T31194] ? proc_fail_nth_read+0x220/0x220 [ 2843.596786][T31194] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2843.601730][T31194] ? vfs_write+0x9af/0x1050 [ 2843.606070][T31194] ? vmacache_update+0xb7/0x120 [ 2843.610757][T31194] kernel_clone+0x22d/0x990 [ 2843.615105][T31194] ? file_end_write+0x1b0/0x1b0 [ 2843.619782][T31194] ? __kasan_check_write+0x14/0x20 [ 2843.624734][T31194] ? create_io_thread+0x1e0/0x1e0 [ 2843.629591][T31194] ? __mutex_lock_slowpath+0x10/0x10 [ 2843.634710][T31194] __x64_sys_clone+0x289/0x310 [ 2843.639311][T31194] ? __do_sys_vfork+0x130/0x130 [ 2843.643999][T31194] ? debug_smp_processor_id+0x17/0x20 [ 2843.649204][T31194] do_syscall_64+0x44/0xd0 [ 2843.653457][T31194] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2843.659186][T31194] RIP: 0033:0x7f4243ed90d9 [ 2843.663446][T31194] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2843.682880][T31194] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2843.691129][T31194] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2843.698941][T31194] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2843.706746][T31194] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:41:52 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 17) 07:41:52 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x300, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) close(r1) close(r0) 07:41:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000b00000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="f8cb00000004000000fffffffff6000095000000000000006599bffe3518caed08ea27ad484a525d8bc6e2a6ce57d7019f66ed1525c5be32795be2a2ca1629b44961035d9b3d4f8f4c1e0b967b6147dec51b71cf9efa4add16c2afb6c0c68ce9263dce935f63bbf63b180e6c7f3a120d4d0347487851f194571852462b000eafa9017f"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="f8cb00000004000000fffffffff6000095000000000000006599bffe3518caed08ea27ad484a525d8bc6e2a6ce57d7019f66ed1525c5be32795be2a2ca1629b44961035d9b3d4f8f4c1e0b967b6147dec51b71cf9efa4add16c2afb6c0c68ce9263dce935f63bbf63b180e6c7f3a120d4d0347487851f194571852462b000eafa9017f"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) [ 2843.714559][T31194] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2843.722371][T31194] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2843.730185][T31194] [ 2843.779913][T31215] FAULT_INJECTION: forcing a failure. [ 2843.779913][T31215] name failslab, interval 1, probability 0, space 0, times 0 [ 2843.792385][T31215] CPU: 1 PID: 31215 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2843.802391][T31215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2843.812291][T31215] Call Trace: [ 2843.815409][T31215] [ 2843.818277][T31215] dump_stack_lvl+0x151/0x1b7 [ 2843.822702][T31215] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2843.827994][T31215] dump_stack+0x15/0x17 [ 2843.831994][T31215] should_fail+0x3c0/0x510 [ 2843.836245][T31215] __should_failslab+0x9f/0xe0 [ 2843.840842][T31215] should_failslab+0x9/0x20 [ 2843.845180][T31215] kmem_cache_alloc+0x4f/0x2f0 [ 2843.849781][T31215] ? dup_mm+0x29/0x330 [ 2843.853688][T31215] dup_mm+0x29/0x330 [ 2843.857415][T31215] copy_mm+0x108/0x1b0 [ 2843.861321][T31215] copy_process+0x1295/0x3250 [ 2843.865836][T31215] ? proc_fail_nth_write+0x213/0x290 [ 2843.870963][T31215] ? proc_fail_nth_read+0x220/0x220 [ 2843.875994][T31215] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2843.880937][T31215] ? vfs_write+0x9af/0x1050 [ 2843.885279][T31215] ? vmacache_update+0xb7/0x120 [ 2843.889968][T31215] kernel_clone+0x22d/0x990 [ 2843.894304][T31215] ? file_end_write+0x1b0/0x1b0 [ 2843.898990][T31215] ? __kasan_check_write+0x14/0x20 [ 2843.903937][T31215] ? create_io_thread+0x1e0/0x1e0 [ 2843.908797][T31215] ? __mutex_lock_slowpath+0x10/0x10 [ 2843.913919][T31215] __x64_sys_clone+0x289/0x310 [ 2843.918521][T31215] ? __do_sys_vfork+0x130/0x130 [ 2843.923204][T31215] ? debug_smp_processor_id+0x17/0x20 [ 2843.928414][T31215] do_syscall_64+0x44/0xd0 [ 2843.932667][T31215] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2843.938393][T31215] RIP: 0033:0x7f4243ed90d9 [ 2843.942647][T31215] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2843.962089][T31215] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2843.970332][T31215] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2843.978142][T31215] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2843.985957][T31215] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2843.993766][T31215] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2844.001576][T31215] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2844.009390][T31215] 07:41:52 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) r0 = getpid() perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 07:41:52 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x3fb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000dd0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) (async) close(r1) (async) close(r0) 07:41:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000697908e8924bdc68290e9d58bf21cc41cbbde07dcb0b"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xb2, &(0x7f0000000000)=""/178, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xa, &(0x7f0000000100)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x58}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @call={0x85, 0x0, 0x0, 0x8b}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f}], &(0x7f0000000180)='syzkaller\x00', 0x50422aaa, 0xad, &(0x7f00000001c0)=""/173, 0x40f00, 0x9, '\x00', r0, 0x0, r1, 0x8, &(0x7f0000000340)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x3, 0x20, 0xfffffff8}, 0x10, 0x16bf5, r3}, 0x80) 07:41:52 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 18) 07:41:52 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x500, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) close(r1) (async) close(r0) 07:41:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000f00000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000697908e8924bdc68290e9d58bf21cc41cbbde07dcb0b"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xb2, &(0x7f0000000000)=""/178, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xa, &(0x7f0000000100)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x58}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @call={0x85, 0x0, 0x0, 0x8b}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f}], &(0x7f0000000180)='syzkaller\x00', 0x50422aaa, 0xad, &(0x7f00000001c0)=""/173, 0x40f00, 0x9, '\x00', r0, 0x0, r1, 0x8, &(0x7f0000000340)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x3, 0x20, 0xfffffff8}, 0x10, 0x16bf5, r3}, 0x80) 07:41:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000003fb0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2844.156163][T31224] FAULT_INJECTION: forcing a failure. [ 2844.156163][T31224] name failslab, interval 1, probability 0, space 0, times 0 [ 2844.176187][T31224] CPU: 1 PID: 31224 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2844.186249][T31224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2844.196145][T31224] Call Trace: [ 2844.199265][T31224] 07:41:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair(0x27, 0x3, 0xffffefbf, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYRESHEX], &(0x7f00000000c0)=""/153, 0x69, 0x99}, 0x20) close(r0) [ 2844.202044][T31224] dump_stack_lvl+0x151/0x1b7 [ 2844.206557][T31224] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2844.211849][T31224] ? xas_nomem+0x19e/0x1e0 [ 2844.216102][T31224] dump_stack+0x15/0x17 [ 2844.220096][T31224] should_fail+0x3c0/0x510 [ 2844.224347][T31224] ? setup_userns_sysctls+0x55/0x340 [ 2844.229472][T31224] __should_failslab+0x9f/0xe0 [ 2844.234077][T31224] should_failslab+0x9/0x20 [ 2844.238409][T31224] __kmalloc_track_caller+0x6c/0x350 [ 2844.243529][T31224] ? setup_userns_sysctls+0x340/0x340 [ 2844.248741][T31224] kmemdup+0x24/0x50 [ 2844.252468][T31224] setup_userns_sysctls+0x55/0x340 [ 2844.257420][T31224] create_user_ns+0x1227/0x19b0 [ 2844.262107][T31224] ? utsns_owner+0x40/0x40 [ 2844.266356][T31224] ? security_prepare_creds+0x149/0x160 [ 2844.271735][T31224] ? prepare_creds+0x485/0x690 [ 2844.276335][T31224] copy_creds+0x200/0x640 [ 2844.280498][T31224] copy_process+0x775/0x3250 [ 2844.284926][T31224] ? __kasan_check_write+0x14/0x20 [ 2844.289873][T31224] ? proc_fail_nth_write+0x213/0x290 [ 2844.294991][T31224] ? proc_fail_nth_read+0x220/0x220 [ 2844.300028][T31224] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2844.304979][T31224] ? vfs_write+0x9af/0x1050 [ 2844.309317][T31224] ? vmacache_update+0xb7/0x120 [ 2844.314000][T31224] kernel_clone+0x22d/0x990 [ 2844.318341][T31224] ? file_end_write+0x1b0/0x1b0 [ 2844.323025][T31224] ? __kasan_check_write+0x14/0x20 [ 2844.327974][T31224] ? create_io_thread+0x1e0/0x1e0 [ 2844.332834][T31224] ? __mutex_lock_slowpath+0x10/0x10 [ 2844.337953][T31224] __x64_sys_clone+0x289/0x310 [ 2844.342554][T31224] ? __do_sys_vfork+0x130/0x130 [ 2844.347240][T31224] ? debug_smp_processor_id+0x17/0x20 [ 2844.352447][T31224] do_syscall_64+0x44/0xd0 [ 2844.356701][T31224] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2844.362430][T31224] RIP: 0033:0x7f4243ed90d9 [ 2844.366683][T31224] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2844.386122][T31224] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2844.394368][T31224] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 07:41:52 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) 07:41:52 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x501, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async, rerun: 32) socketpair(0x27, 0x3, 0xffffefbf, &(0x7f0000000000)) (rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYRESHEX], &(0x7f00000000c0)=""/153, 0x69, 0x99}, 0x20) close(r0) 07:41:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000697908e8924bdc68290e9d58bf21cc41cbbde07dcb0b"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xb2, &(0x7f0000000000)=""/178, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xa, &(0x7f0000000100)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x58}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @call={0x85, 0x0, 0x0, 0x8b}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f}], &(0x7f0000000180)='syzkaller\x00', 0x50422aaa, 0xad, &(0x7f00000001c0)=""/173, 0x40f00, 0x9, '\x00', r0, 0x0, r1, 0x8, &(0x7f0000000340)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x3, 0x20, 0xfffffff8}, 0x10, 0x16bf5, r3}, 0x80) 07:41:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000ff0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:52 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 19) [ 2844.402179][T31224] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2844.409992][T31224] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2844.417801][T31224] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2844.425614][T31224] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2844.433429][T31224] 07:41:52 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) 07:41:52 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x600, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:52 executing program 0: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 07:41:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair(0x27, 0x3, 0xffffefbf, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYRESHEX], &(0x7f00000000c0)=""/153, 0x69, 0x99}, 0x20) (async) close(r0) 07:41:52 executing program 0: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x2) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) (async) 07:41:52 executing program 0: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) [ 2844.457718][T31249] FAULT_INJECTION: forcing a failure. [ 2844.457718][T31249] name failslab, interval 1, probability 0, space 0, times 0 [ 2844.476532][T31249] CPU: 1 PID: 31249 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2844.486595][T31249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2844.496490][T31249] Call Trace: [ 2844.499618][T31249] [ 2844.502393][T31249] dump_stack_lvl+0x151/0x1b7 07:41:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0xd, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x4, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x5}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @generic={0x9, 0xf, 0xf, 0x1000, 0x80000001}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @jmp={0x5, 0x1, 0xb, 0xc, 0xb, 0x2, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @generic={0x5, 0x8, 0x3, 0x4, 0x200}, @alu={0x7, 0x0, 0xd, 0xb, 0x2, 0xfffffffffffffff4, 0x4}], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdd3, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) socketpair(0x5, 0x2, 0xfffffffd, &(0x7f0000000000)) 07:41:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0xd, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x4, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x5}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @generic={0x9, 0xf, 0xf, 0x1000, 0x80000001}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @jmp={0x5, 0x1, 0xb, 0xc, 0xb, 0x2, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @generic={0x5, 0x8, 0x3, 0x4, 0x200}, @alu={0x7, 0x0, 0xd, 0xb, 0x2, 0xfffffffffffffff4, 0x4}], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdd3, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0xd, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x4, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x5}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @generic={0x9, 0xf, 0xf, 0x1000, 0x80000001}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @jmp={0x5, 0x1, 0xb, 0xc, 0xb, 0x2, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @generic={0x5, 0x8, 0x3, 0x4, 0x200}, @alu={0x7, 0x0, 0xd, 0xb, 0x2, 0xfffffffffffffff4, 0x4}], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdd3, 0x10, 0x0, 0x0, 0x6c00}, 0x80) [ 2844.506905][T31249] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2844.512203][T31249] dump_stack+0x15/0x17 [ 2844.516195][T31249] should_fail+0x3c0/0x510 [ 2844.520445][T31249] ? __register_sysctl_table+0xee/0x1330 [ 2844.525912][T31249] __should_failslab+0x9f/0xe0 [ 2844.530511][T31249] should_failslab+0x9/0x20 [ 2844.534852][T31249] __kmalloc+0x6d/0x350 [ 2844.538847][T31249] __register_sysctl_table+0xee/0x1330 [ 2844.544139][T31249] ? __kmalloc_track_caller+0x202/0x350 [ 2844.549521][T31249] ? kmemdup+0x3f/0x50 [ 2844.553425][T31249] ? memcpy+0x56/0x70 [ 2844.557241][T31249] setup_userns_sysctls+0x2b1/0x340 [ 2844.562274][T31249] create_user_ns+0x1227/0x19b0 [ 2844.566962][T31249] ? utsns_owner+0x40/0x40 [ 2844.571212][T31249] ? security_prepare_creds+0x149/0x160 [ 2844.576598][T31249] ? prepare_creds+0x485/0x690 [ 2844.581194][T31249] copy_creds+0x200/0x640 [ 2844.585363][T31249] copy_process+0x775/0x3250 [ 2844.589791][T31249] ? __kasan_check_write+0x14/0x20 [ 2844.594734][T31249] ? proc_fail_nth_write+0x213/0x290 [ 2844.599858][T31249] ? proc_fail_nth_read+0x220/0x220 [ 2844.604889][T31249] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2844.609834][T31249] ? vfs_write+0x9af/0x1050 [ 2844.614175][T31249] ? vmacache_update+0xb7/0x120 [ 2844.618864][T31249] kernel_clone+0x22d/0x990 [ 2844.623200][T31249] ? file_end_write+0x1b0/0x1b0 [ 2844.627888][T31249] ? __kasan_check_write+0x14/0x20 [ 2844.632835][T31249] ? create_io_thread+0x1e0/0x1e0 [ 2844.637694][T31249] ? __mutex_lock_slowpath+0x10/0x10 [ 2844.642815][T31249] __x64_sys_clone+0x289/0x310 [ 2844.647417][T31249] ? __do_sys_vfork+0x130/0x130 [ 2844.652103][T31249] ? debug_smp_processor_id+0x17/0x20 [ 2844.657309][T31249] do_syscall_64+0x44/0xd0 [ 2844.661562][T31249] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2844.667290][T31249] RIP: 0033:0x7f4243ed90d9 [ 2844.671543][T31249] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2844.690985][T31249] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2844.699232][T31249] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 07:41:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000c8c51a00000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 20) 07:41:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r0) (async) socketpair(0x5, 0x2, 0xfffffffd, &(0x7f0000000000)) 07:41:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)=r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000000c0)=0xa0e) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000), 0x10) 07:41:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x700, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) 07:41:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000002000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000001000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) (async) socketpair(0x5, 0x2, 0xfffffffd, &(0x7f0000000000)) 07:41:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x900, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) [ 2844.707044][T31249] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2844.714854][T31249] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2844.722678][T31249] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2844.730475][T31249] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2844.738292][T31249] 07:41:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)=r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000000c0)=0xa0e) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000), 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)=r1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) (async) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000000c0)=0xa0e) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000), 0x10) (async) 07:41:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000101000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2844.790213][T31305] FAULT_INJECTION: forcing a failure. [ 2844.790213][T31305] name failslab, interval 1, probability 0, space 0, times 0 [ 2844.807902][T31305] CPU: 1 PID: 31305 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2844.817964][T31305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2844.827858][T31305] Call Trace: [ 2844.830978][T31305] [ 2844.833760][T31305] dump_stack_lvl+0x151/0x1b7 [ 2844.838272][T31305] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2844.843686][T31305] dump_stack+0x15/0x17 [ 2844.847668][T31305] should_fail+0x3c0/0x510 [ 2844.851921][T31305] __should_failslab+0x9f/0xe0 [ 2844.856522][T31305] should_failslab+0x9/0x20 [ 2844.860860][T31305] kmem_cache_alloc+0x4f/0x2f0 [ 2844.865460][T31305] ? vm_area_dup+0x26/0x1d0 [ 2844.869801][T31305] ? __kasan_check_read+0x11/0x20 [ 2844.874663][T31305] vm_area_dup+0x26/0x1d0 [ 2844.878826][T31305] dup_mmap+0x6b8/0xea0 [ 2844.882828][T31305] ? __delayed_free_task+0x20/0x20 [ 2844.887767][T31305] ? mm_init+0x807/0x960 [ 2844.891843][T31305] dup_mm+0x91/0x330 [ 2844.895585][T31305] copy_mm+0x108/0x1b0 [ 2844.899481][T31305] copy_process+0x1295/0x3250 [ 2844.903995][T31305] ? proc_fail_nth_write+0x213/0x290 [ 2844.909117][T31305] ? proc_fail_nth_read+0x220/0x220 [ 2844.914149][T31305] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2844.919098][T31305] ? vfs_write+0x9af/0x1050 [ 2844.923438][T31305] ? vmacache_update+0xb7/0x120 [ 2844.928127][T31305] kernel_clone+0x22d/0x990 [ 2844.932463][T31305] ? file_end_write+0x1b0/0x1b0 [ 2844.937149][T31305] ? __kasan_check_write+0x14/0x20 [ 2844.942100][T31305] ? create_io_thread+0x1e0/0x1e0 [ 2844.946960][T31305] ? __mutex_lock_slowpath+0x10/0x10 [ 2844.952077][T31305] __x64_sys_clone+0x289/0x310 [ 2844.956682][T31305] ? __do_sys_vfork+0x130/0x130 [ 2844.961365][T31305] ? debug_smp_processor_id+0x17/0x20 [ 2844.966573][T31305] do_syscall_64+0x44/0xd0 [ 2844.970830][T31305] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2844.976551][T31305] RIP: 0033:0x7f4243ed90d9 [ 2844.980807][T31305] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2845.000246][T31305] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2845.008491][T31305] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2845.016302][T31305] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2845.024116][T31305] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2845.031925][T31305] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:41:53 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 21) 07:41:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x902, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000002000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)=r1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000000c0)=0xa0e) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000), 0x10) 07:41:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) close(r1) close(r0) 07:41:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) close(r1) (async) close(r0) 07:41:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xa00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) (async) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) 07:41:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xb00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2845.039736][T31305] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2845.047549][T31305] 07:41:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000003000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xc00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x6, 0x10}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90df}, [@alu={0x7, 0x0, 0x8, 0xb, 0x7, 0xfffffffffffffff0, 0xfffffffffffffffc}, @alu={0x0, 0x0, 0xc, 0x5, 0x8, 0x0, 0x8}, @alu={0x4, 0x0, 0xb, 0x1, 0x7, 0xffffffffffffffc0, 0x8}, @generic={0x20, 0x1, 0x7, 0xb638, 0xffffffc1}, @call={0x85, 0x0, 0x0, 0x80}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4, '\x00', r0, 0x25, r1, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x1, 0x100}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, r2, 0x1, 0xffffffffffffffff, r3, 0x1, 0x1, 0x1, 0xffffffffffffffff]}, 0x80) [ 2845.087972][T31338] FAULT_INJECTION: forcing a failure. [ 2845.087972][T31338] name failslab, interval 1, probability 0, space 0, times 0 [ 2845.109920][T31338] CPU: 1 PID: 31338 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2845.119983][T31338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2845.129879][T31338] Call Trace: [ 2845.133010][T31338] [ 2845.135784][T31338] dump_stack_lvl+0x151/0x1b7 [ 2845.140293][T31338] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2845.145586][T31338] ? __register_sysctl_table+0x1264/0x1330 [ 2845.151226][T31338] dump_stack+0x15/0x17 [ 2845.155216][T31338] should_fail+0x3c0/0x510 [ 2845.159471][T31338] ? alloc_ucounts+0x161/0x4e0 [ 2845.164070][T31338] __should_failslab+0x9f/0xe0 [ 2845.168668][T31338] should_failslab+0x9/0x20 [ 2845.173035][T31338] kmem_cache_alloc_trace+0x4a/0x310 [ 2845.178133][T31338] ? utsns_owner+0x40/0x40 [ 2845.182383][T31338] alloc_ucounts+0x161/0x4e0 [ 2845.186809][T31338] copy_creds+0x345/0x640 [ 2845.190975][T31338] copy_process+0x775/0x3250 [ 2845.195401][T31338] ? __kasan_check_write+0x14/0x20 [ 2845.200347][T31338] ? proc_fail_nth_write+0x213/0x290 [ 2845.205469][T31338] ? proc_fail_nth_read+0x220/0x220 [ 2845.210506][T31338] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2845.215452][T31338] ? vfs_write+0x9af/0x1050 [ 2845.219789][T31338] ? vmacache_update+0xb7/0x120 [ 2845.224477][T31338] kernel_clone+0x22d/0x990 [ 2845.228820][T31338] ? file_end_write+0x1b0/0x1b0 [ 2845.233503][T31338] ? __kasan_check_write+0x14/0x20 [ 2845.238451][T31338] ? create_io_thread+0x1e0/0x1e0 [ 2845.243309][T31338] ? __mutex_lock_slowpath+0x10/0x10 [ 2845.248431][T31338] __x64_sys_clone+0x289/0x310 [ 2845.253032][T31338] ? __do_sys_vfork+0x130/0x130 [ 2845.257718][T31338] ? debug_smp_processor_id+0x17/0x20 [ 2845.262926][T31338] do_syscall_64+0x44/0xd0 [ 2845.267176][T31338] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2845.272904][T31338] RIP: 0033:0x7f4243ed90d9 [ 2845.277161][T31338] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2845.296600][T31338] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2845.304843][T31338] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2845.312657][T31338] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2845.320467][T31338] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2845.328280][T31338] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:41:53 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 22) 07:41:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xd00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000004000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x6, 0x10}, 0xc) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90df}, [@alu={0x7, 0x0, 0x8, 0xb, 0x7, 0xfffffffffffffff0, 0xfffffffffffffffc}, @alu={0x0, 0x0, 0xc, 0x5, 0x8, 0x0, 0x8}, @alu={0x4, 0x0, 0xb, 0x1, 0x7, 0xffffffffffffffc0, 0x8}, @generic={0x20, 0x1, 0x7, 0xb638, 0xffffffc1}, @call={0x85, 0x0, 0x0, 0x80}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4, '\x00', r0, 0x25, r1, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x1, 0x100}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, r2, 0x1, 0xffffffffffffffff, r3, 0x1, 0x1, 0x1, 0xffffffffffffffff]}, 0x80) 07:41:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) close(r1) (async) close(r0) 07:41:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) 07:41:53 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000005000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2845.336089][T31338] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2845.343901][T31338] [ 2845.375658][T31371] FAULT_INJECTION: forcing a failure. [ 2845.375658][T31371] name failslab, interval 1, probability 0, space 0, times 0 [ 2845.390682][T31371] CPU: 0 PID: 31371 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2845.400747][T31371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2845.410644][T31371] Call Trace: [ 2845.413765][T31371] [ 2845.416543][T31371] dump_stack_lvl+0x151/0x1b7 [ 2845.421052][T31371] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2845.426348][T31371] dump_stack+0x15/0x17 [ 2845.430343][T31371] should_fail+0x3c0/0x510 [ 2845.434592][T31371] __should_failslab+0x9f/0xe0 [ 2845.439195][T31371] should_failslab+0x9/0x20 [ 2845.443534][T31371] kmem_cache_alloc+0x4f/0x2f0 [ 2845.448137][T31371] ? vm_area_dup+0x26/0x1d0 [ 2845.452474][T31371] vm_area_dup+0x26/0x1d0 [ 2845.456642][T31371] dup_mmap+0x6b8/0xea0 [ 2845.460628][T31371] ? __delayed_free_task+0x20/0x20 [ 2845.465582][T31371] ? mm_init+0x807/0x960 [ 2845.469656][T31371] dup_mm+0x91/0x330 [ 2845.473390][T31371] copy_mm+0x108/0x1b0 [ 2845.477298][T31371] copy_process+0x1295/0x3250 [ 2845.481806][T31371] ? proc_fail_nth_write+0x213/0x290 [ 2845.486925][T31371] ? proc_fail_nth_read+0x220/0x220 [ 2845.491964][T31371] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2845.496908][T31371] ? vfs_write+0x9af/0x1050 [ 2845.501251][T31371] kernel_clone+0x22d/0x990 [ 2845.505590][T31371] ? file_end_write+0x1b0/0x1b0 [ 2845.510276][T31371] ? __kasan_check_write+0x14/0x20 [ 2845.515222][T31371] ? create_io_thread+0x1e0/0x1e0 [ 2845.520081][T31371] ? __mutex_lock_slowpath+0x10/0x10 [ 2845.525204][T31371] __x64_sys_clone+0x289/0x310 [ 2845.529818][T31371] ? __do_sys_vfork+0x130/0x130 [ 2845.534491][T31371] ? debug_smp_processor_id+0x17/0x20 [ 2845.539699][T31371] do_syscall_64+0x44/0xd0 [ 2845.543949][T31371] ? irqentry_exit+0x12/0x40 [ 2845.548377][T31371] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2845.554106][T31371] RIP: 0033:0x7f4243ed90d9 [ 2845.558362][T31371] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2845.577801][T31371] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xe00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000105000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) sendmsg$tipc(r2, &(0x7f0000000540)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x2, 0x1}}, 0x10, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x810}, 0x8080) close(r1) close(r0) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000180), 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) 07:41:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_service_time\x00', 0x0, 0x0) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x6, 0x10}, 0xc) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90df}, [@alu={0x7, 0x0, 0x8, 0xb, 0x7, 0xfffffffffffffff0, 0xfffffffffffffffc}, @alu={0x0, 0x0, 0xc, 0x5, 0x8, 0x0, 0x8}, @alu={0x4, 0x0, 0xb, 0x1, 0x7, 0xffffffffffffffc0, 0x8}, @generic={0x20, 0x1, 0x7, 0xb638, 0xffffffc1}, @call={0x85, 0x0, 0x0, 0x80}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4, '\x00', r0, 0x25, r1, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x1, 0x100}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, r2, 0x1, 0xffffffffffffffff, r3, 0x1, 0x1, 0x1, 0xffffffffffffffff]}, 0x80) 07:41:54 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 23) [ 2845.586043][T31371] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2845.593855][T31371] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2845.601666][T31371] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2845.609477][T31371] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2845.617289][T31371] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2845.625103][T31371] 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x1100, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000006000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (rerun: 64) sendmsg$tipc(r2, &(0x7f0000000540)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x2, 0x1}}, 0x10, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x810}, 0x8080) close(r1) close(r0) (async) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000180), 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) (async) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) 07:41:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 07:41:54 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) [ 2845.665268][T31388] FAULT_INJECTION: forcing a failure. [ 2845.665268][T31388] name failslab, interval 1, probability 0, space 0, times 0 [ 2845.695298][T31388] CPU: 0 PID: 31388 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2845.705366][T31388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x1200, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x1800, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x2000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x2500, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2845.715271][T31388] Call Trace: [ 2845.718384][T31388] [ 2845.721164][T31388] dump_stack_lvl+0x151/0x1b7 [ 2845.725680][T31388] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2845.730970][T31388] ? avc_has_perm_noaudit+0x358/0x450 [ 2845.736180][T31388] dump_stack+0x15/0x17 [ 2845.740170][T31388] should_fail+0x3c0/0x510 [ 2845.744432][T31388] __should_failslab+0x9f/0xe0 [ 2845.749026][T31388] should_failslab+0x9/0x20 [ 2845.753361][T31388] kmem_cache_alloc+0x4f/0x2f0 [ 2845.757966][T31388] ? dup_fd+0x71/0xa40 [ 2845.761867][T31388] dup_fd+0x71/0xa40 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x4000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x4800, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2845.765602][T31388] ? avc_has_perm+0x16d/0x260 [ 2845.770117][T31388] ? avc_has_perm_noaudit+0x450/0x450 [ 2845.775320][T31388] copy_files+0xe6/0x200 [ 2845.779398][T31388] ? perf_event_attrs+0x30/0x30 [ 2845.784085][T31388] ? dup_task_struct+0xa60/0xa60 [ 2845.788861][T31388] ? security_task_alloc+0x132/0x150 [ 2845.793977][T31388] copy_process+0x11e9/0x3250 [ 2845.798490][T31388] ? proc_fail_nth_write+0x213/0x290 [ 2845.803611][T31388] ? proc_fail_nth_read+0x220/0x220 [ 2845.808646][T31388] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2845.813596][T31388] ? vfs_write+0x9af/0x1050 [ 2845.817929][T31388] ? vmacache_update+0xb7/0x120 [ 2845.822616][T31388] kernel_clone+0x22d/0x990 [ 2845.826960][T31388] ? file_end_write+0x1b0/0x1b0 [ 2845.831645][T31388] ? __kasan_check_write+0x14/0x20 [ 2845.836589][T31388] ? create_io_thread+0x1e0/0x1e0 [ 2845.841451][T31388] ? __mutex_lock_slowpath+0x10/0x10 [ 2845.846573][T31388] __x64_sys_clone+0x289/0x310 [ 2845.851173][T31388] ? __do_sys_vfork+0x130/0x130 [ 2845.855860][T31388] ? debug_smp_processor_id+0x17/0x20 [ 2845.861068][T31388] do_syscall_64+0x44/0xd0 [ 2845.865320][T31388] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2845.871049][T31388] RIP: 0033:0x7f4243ed90d9 [ 2845.875300][T31388] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2845.894742][T31388] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2845.902988][T31388] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 07:41:54 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 24) 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x4c00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) sendmsg$tipc(r2, &(0x7f0000000540)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x2, 0x1}}, 0x10, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x810}, 0x8080) close(r1) close(r0) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000180), 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (async) sendmsg$tipc(r2, &(0x7f0000000540)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x2, 0x1}}, 0x10, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x810}, 0x8080) (async) close(r1) (async) close(r0) (async) openat$cgroup_ro(r2, &(0x7f0000000140)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) (async) openat$cgroup_freezer_state(r3, &(0x7f0000000180), 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) (async) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) (async) openat$cgroup_ro(r6, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) (async) 07:41:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000007000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) [ 2845.910800][T31388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2845.918609][T31388] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2845.926420][T31388] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2845.934231][T31388] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2845.942046][T31388] 07:41:54 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async, rerun: 32) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000008000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 5: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)={0x2, 0x0, [0x0, 0x0]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000006f48e90000dbea40dddd77bd92ccd0dbe54c7eb458cf79aafb456406f46b4566be35d8eecd096d8acb8868f020027c9215fa010315e9588001a742cd8ff099753e75a177701e666cf0c34057cda0bc43042695ffef5996f6f9bff1374e56a15fb9612b6ad4145b11fb1b9c409e2cbda935b96149a1df67875302008a52ec93a7fd1fc365b963eec85e8bcc20c55746f75d1b815a1e7349a777c2d8cdb8a6f8ee34ede18e8644ebd0d25356abcaffa368c10f9a280a439735dd6517af6dc5b90346369bf1f103128c46c39fad6001a0"]) 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x6400, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2845.972293][T31439] FAULT_INJECTION: forcing a failure. [ 2845.972293][T31439] name failslab, interval 1, probability 0, space 0, times 0 [ 2845.988182][T31439] CPU: 0 PID: 31439 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2845.998239][T31439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2846.008133][T31439] Call Trace: [ 2846.011259][T31439] [ 2846.014034][T31439] dump_stack_lvl+0x151/0x1b7 07:41:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000009000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000a000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x6601, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2846.018551][T31439] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2846.023846][T31439] dump_stack+0x15/0x17 [ 2846.027837][T31439] should_fail+0x3c0/0x510 [ 2846.032090][T31439] ? kvmalloc_node+0x82/0x130 [ 2846.036600][T31439] __should_failslab+0x9f/0xe0 [ 2846.041202][T31439] should_failslab+0x9/0x20 [ 2846.045540][T31439] __kmalloc+0x6d/0x350 [ 2846.049534][T31439] ? __kasan_kmalloc+0x9/0x10 [ 2846.054056][T31439] kvmalloc_node+0x82/0x130 [ 2846.058385][T31439] alloc_fdtable+0xea/0x2b0 [ 2846.062728][T31439] dup_fd+0x781/0xa40 [ 2846.066547][T31439] ? avc_has_perm+0x16d/0x260 [ 2846.071063][T31439] copy_files+0xe6/0x200 [ 2846.075136][T31439] ? perf_event_attrs+0x30/0x30 [ 2846.079824][T31439] ? dup_task_struct+0xa60/0xa60 [ 2846.084600][T31439] ? security_task_alloc+0x132/0x150 [ 2846.089717][T31439] copy_process+0x11e9/0x3250 [ 2846.094234][T31439] ? proc_fail_nth_write+0x213/0x290 [ 2846.099352][T31439] ? proc_fail_nth_read+0x220/0x220 [ 2846.104386][T31439] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2846.109328][T31439] ? vfs_write+0x9af/0x1050 [ 2846.113671][T31439] ? vmacache_update+0xb7/0x120 [ 2846.118354][T31439] kernel_clone+0x22d/0x990 [ 2846.122697][T31439] ? file_end_write+0x1b0/0x1b0 [ 2846.127380][T31439] ? __kasan_check_write+0x14/0x20 [ 2846.132327][T31439] ? create_io_thread+0x1e0/0x1e0 [ 2846.137188][T31439] ? __mutex_lock_slowpath+0x10/0x10 [ 2846.142310][T31439] __x64_sys_clone+0x289/0x310 [ 2846.146912][T31439] ? __do_sys_vfork+0x130/0x130 [ 2846.151597][T31439] ? debug_smp_processor_id+0x17/0x20 [ 2846.156805][T31439] do_syscall_64+0x44/0xd0 [ 2846.161060][T31439] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2846.166785][T31439] RIP: 0033:0x7f4243ed90d9 [ 2846.171038][T31439] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2846.190481][T31439] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2846.198724][T31439] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2846.206533][T31439] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2846.214345][T31439] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:41:54 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 25) 07:41:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000b000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 5: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)={0x2, 0x0, [0x0, 0x0]}) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) close(r1) close(r0) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) close(r2) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000006f48e90000dbea40dddd77bd92ccd0dbe54c7eb458cf79aafb456406f46b4566be35d8eecd096d8acb8868f020027c9215fa010315e9588001a742cd8ff099753e75a177701e666cf0c34057cda0bc43042695ffef5996f6f9bff1374e56a15fb9612b6ad4145b11fb1b9c409e2cbda935b96149a1df67875302008a52ec93a7fd1fc365b963eec85e8bcc20c55746f75d1b815a1e7349a777c2d8cdb8a6f8ee34ede18e8644ebd0d25356abcaffa368c10f9a280a439735dd6517af6dc5b90346369bf1f103128c46c39fad6001a0"]) 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x6800, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 07:41:54 executing program 3: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup_freezer_state(r1, &(0x7f0000000080), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='wake_reaper\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)=0x1) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0xb485) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) [ 2846.222157][T31439] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2846.229967][T31439] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2846.237781][T31439] [ 2846.257110][T31458] FAULT_INJECTION: forcing a failure. [ 2846.257110][T31458] name failslab, interval 1, probability 0, space 0, times 0 [ 2846.278553][T31458] CPU: 0 PID: 31458 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2846.288623][T31458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2846.298517][T31458] Call Trace: [ 2846.301644][T31458] [ 2846.304418][T31458] dump_stack_lvl+0x151/0x1b7 [ 2846.308930][T31458] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2846.314227][T31458] dump_stack+0x15/0x17 [ 2846.318217][T31458] should_fail+0x3c0/0x510 [ 2846.322470][T31458] ? kvmalloc_node+0x82/0x130 [ 2846.326983][T31458] __should_failslab+0x9f/0xe0 [ 2846.331586][T31458] should_failslab+0x9/0x20 [ 2846.335924][T31458] __kmalloc+0x6d/0x350 [ 2846.339915][T31458] ? kvmalloc_node+0x82/0x130 [ 2846.344429][T31458] kvmalloc_node+0x82/0x130 [ 2846.348771][T31458] alloc_fdtable+0x173/0x2b0 [ 2846.353195][T31458] dup_fd+0x781/0xa40 [ 2846.357016][T31458] ? avc_has_perm+0x16d/0x260 [ 2846.361528][T31458] copy_files+0xe6/0x200 [ 2846.365618][T31458] ? perf_event_attrs+0x30/0x30 [ 2846.370293][T31458] ? dup_task_struct+0xa60/0xa60 [ 2846.375065][T31458] ? security_task_alloc+0x132/0x150 [ 2846.380188][T31458] copy_process+0x11e9/0x3250 [ 2846.384702][T31458] ? proc_fail_nth_write+0x213/0x290 [ 2846.389820][T31458] ? proc_fail_nth_read+0x220/0x220 [ 2846.394854][T31458] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2846.399800][T31458] ? vfs_write+0x9af/0x1050 [ 2846.404141][T31458] ? vmacache_update+0xb7/0x120 [ 2846.408828][T31458] kernel_clone+0x22d/0x990 [ 2846.413168][T31458] ? file_end_write+0x1b0/0x1b0 [ 2846.417852][T31458] ? __kasan_check_write+0x14/0x20 [ 2846.422800][T31458] ? create_io_thread+0x1e0/0x1e0 [ 2846.427663][T31458] ? __mutex_lock_slowpath+0x10/0x10 [ 2846.432785][T31458] __x64_sys_clone+0x289/0x310 [ 2846.437382][T31458] ? __do_sys_vfork+0x130/0x130 [ 2846.442072][T31458] ? debug_smp_processor_id+0x17/0x20 [ 2846.447277][T31458] do_syscall_64+0x44/0xd0 [ 2846.451528][T31458] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2846.457256][T31458] RIP: 0033:0x7f4243ed90d9 [ 2846.461510][T31458] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2846.480950][T31458] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2846.489195][T31458] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2846.497008][T31458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2846.504818][T31458] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2846.512631][T31458] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2846.520439][T31458] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 07:41:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000c000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x6c00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) 07:41:54 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 26) [ 2846.528254][T31458] 07:41:54 executing program 5: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)={0x2, 0x0, [0x0, 0x0]}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r0) (async) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) close(r2) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000006f48e90000dbea40dddd77bd92ccd0dbe54c7eb458cf79aafb456406f46b4566be35d8eecd096d8acb8868f020027c9215fa010315e9588001a742cd8ff099753e75a177701e666cf0c34057cda0bc43042695ffef5996f6f9bff1374e56a15fb9612b6ad4145b11fb1b9c409e2cbda935b96149a1df67875302008a52ec93a7fd1fc365b963eec85e8bcc20c55746f75d1b815a1e7349a777c2d8cdb8a6f8ee34ede18e8644ebd0d25356abcaffa368c10f9a280a439735dd6517af6dc5b90346369bf1f103128c46c39fad6001a0"]) 07:41:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000d000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 3: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup_freezer_state(r1, &(0x7f0000000080), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='wake_reaper\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)=0x1) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0xb485) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) openat$cgroup_freezer_state(r1, &(0x7f0000000080), 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='wake_reaper\x00', r0}, 0x10) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)=0x1) (async) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) (async) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(r3) (async) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0xb485) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x7400, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@sco={0x1f, @none}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f0000000180)=""/193, 0xc1}], 0x2, &(0x7f0000000b00)=""/4096, 0x1000}, 0x80000140) 07:41:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:54 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000e000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x7a00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2846.561393][T31482] FAULT_INJECTION: forcing a failure. [ 2846.561393][T31482] name failslab, interval 1, probability 0, space 0, times 0 [ 2846.610739][T31482] CPU: 1 PID: 31482 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2846.620819][T31482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2846.630717][T31482] Call Trace: [ 2846.633839][T31482] [ 2846.636617][T31482] dump_stack_lvl+0x151/0x1b7 [ 2846.641129][T31482] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2846.646426][T31482] dump_stack+0x15/0x17 [ 2846.650414][T31482] should_fail+0x3c0/0x510 [ 2846.654669][T31482] __should_failslab+0x9f/0xe0 07:41:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@sco={0x1f, @none}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f0000000180)=""/193, 0xc1}], 0x2, &(0x7f0000000b00)=""/4096, 0x1000}, 0x80000140) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@sco={0x1f, @none}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f0000000180)=""/193, 0xc1}], 0x2, &(0x7f0000000b00)=""/4096, 0x1000}, 0x80000140) (async) 07:41:54 executing program 0: ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) socketpair(0xa, 0x3, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x2f002646048a1f7a, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000180)={'veth1_macvtap\x00', @link_local}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000011722d852401097006fa57fa4a3c9500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x204000, 0x0) 07:41:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000f000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2846.659269][T31482] should_failslab+0x9/0x20 [ 2846.663606][T31482] kmem_cache_alloc+0x4f/0x2f0 [ 2846.668208][T31482] ? anon_vma_clone+0xa1/0x4f0 [ 2846.672806][T31482] anon_vma_clone+0xa1/0x4f0 [ 2846.677229][T31482] anon_vma_fork+0x91/0x4f0 [ 2846.681569][T31482] ? anon_vma_name+0x4c/0x70 [ 2846.685996][T31482] dup_mmap+0x750/0xea0 [ 2846.689986][T31482] ? __delayed_free_task+0x20/0x20 [ 2846.694939][T31482] ? mm_init+0x807/0x960 [ 2846.699012][T31482] dup_mm+0x91/0x330 [ 2846.702751][T31482] copy_mm+0x108/0x1b0 [ 2846.706656][T31482] copy_process+0x1295/0x3250 [ 2846.711164][T31482] ? proc_fail_nth_write+0x213/0x290 [ 2846.716284][T31482] ? proc_fail_nth_read+0x220/0x220 [ 2846.721319][T31482] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2846.726265][T31482] ? vfs_write+0x9af/0x1050 [ 2846.730606][T31482] ? vmacache_update+0xb7/0x120 [ 2846.735294][T31482] kernel_clone+0x22d/0x990 [ 2846.739635][T31482] ? file_end_write+0x1b0/0x1b0 [ 2846.744320][T31482] ? __kasan_check_write+0x14/0x20 [ 2846.749267][T31482] ? create_io_thread+0x1e0/0x1e0 [ 2846.754125][T31482] ? __mutex_lock_slowpath+0x10/0x10 [ 2846.759245][T31482] __x64_sys_clone+0x289/0x310 [ 2846.763847][T31482] ? __do_sys_vfork+0x130/0x130 [ 2846.768534][T31482] ? debug_smp_processor_id+0x17/0x20 [ 2846.773741][T31482] do_syscall_64+0x44/0xd0 [ 2846.778012][T31482] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2846.783808][T31482] RIP: 0033:0x7f4243ed90d9 [ 2846.788062][T31482] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:41:55 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 27) 07:41:55 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x9501, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 0: ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) socketpair(0xa, 0x3, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x2f002646048a1f7a, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000180)={'veth1_macvtap\x00', @link_local}) (async, rerun: 64) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000011722d852401097006fa57fa4a3c9500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (rerun: 64) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x204000, 0x0) 07:41:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000010000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@sco={0x1f, @none}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f0000000180)=""/193, 0xc1}], 0x2, &(0x7f0000000b00)=""/4096, 0x1000}, 0x80000140) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@sco={0x1f, @none}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f0000000180)=""/193, 0xc1}], 0x2, &(0x7f0000000b00)=""/4096, 0x1000}, 0x80000140) (async) 07:41:55 executing program 3: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup_freezer_state(r1, &(0x7f0000000080), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='wake_reaper\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)=0x1) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0xb485) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) openat$cgroup_freezer_state(r1, &(0x7f0000000080), 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='wake_reaper\x00', r0}, 0x10) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)=0x1) (async) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) (async) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(r3) (async) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0xb485) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) [ 2846.807502][T31482] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2846.815744][T31482] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2846.823558][T31482] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2846.831377][T31482] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2846.839182][T31482] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2846.846992][T31482] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2846.854807][T31482] 07:41:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000011000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x9801, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000012000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000), 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000080)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x40) close(r1) close(r0) [ 2846.879726][T31535] FAULT_INJECTION: forcing a failure. [ 2846.879726][T31535] name failslab, interval 1, probability 0, space 0, times 0 [ 2846.919902][T31535] CPU: 1 PID: 31535 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 07:41:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup=r1, r0, 0x4, 0x1, r3}, 0x14) 07:41:55 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x9902, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2846.929980][T31535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2846.939872][T31535] Call Trace: [ 2846.942992][T31535] [ 2846.945770][T31535] dump_stack_lvl+0x151/0x1b7 [ 2846.950288][T31535] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2846.955584][T31535] ? _raw_spin_lock+0xa3/0x1b0 [ 2846.960180][T31535] ? dup_fd+0x51f/0xa40 [ 2846.964172][T31535] dump_stack+0x15/0x17 [ 2846.968164][T31535] should_fail+0x3c0/0x510 [ 2846.972414][T31535] __should_failslab+0x9f/0xe0 [ 2846.977013][T31535] should_failslab+0x9/0x20 [ 2846.981354][T31535] kmem_cache_alloc+0x4f/0x2f0 [ 2846.985951][T31535] ? copy_fs_struct+0x4e/0x230 [ 2846.990553][T31535] copy_fs_struct+0x4e/0x230 [ 2846.994979][T31535] copy_fs+0x72/0x140 [ 2846.998799][T31535] copy_process+0x1214/0x3250 [ 2847.003314][T31535] ? proc_fail_nth_write+0x213/0x290 [ 2847.008430][T31535] ? proc_fail_nth_read+0x220/0x220 [ 2847.013464][T31535] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2847.018410][T31535] ? vfs_write+0x9af/0x1050 [ 2847.022750][T31535] ? vmacache_update+0xb7/0x120 [ 2847.027440][T31535] kernel_clone+0x22d/0x990 [ 2847.031778][T31535] ? file_end_write+0x1b0/0x1b0 [ 2847.036465][T31535] ? __kasan_check_write+0x14/0x20 [ 2847.041413][T31535] ? create_io_thread+0x1e0/0x1e0 [ 2847.046272][T31535] ? __mutex_lock_slowpath+0x10/0x10 [ 2847.051394][T31535] __x64_sys_clone+0x289/0x310 [ 2847.055994][T31535] ? __do_sys_vfork+0x130/0x130 [ 2847.060679][T31535] ? debug_smp_processor_id+0x17/0x20 [ 2847.065887][T31535] do_syscall_64+0x44/0xd0 [ 2847.070141][T31535] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2847.075867][T31535] RIP: 0033:0x7f4243ed90d9 [ 2847.080122][T31535] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2847.099565][T31535] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2847.107807][T31535] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2847.115623][T31535] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 07:41:55 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 28) 07:41:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000), 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000080)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x40) close(r1) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000), 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000080)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x40) (async) close(r1) (async) close(r0) (async) 07:41:55 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xb000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000018000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 0: ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) (async, rerun: 32) socketpair(0xa, 0x3, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x2f002646048a1f7a, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000180)={'veth1_macvtap\x00', @link_local}) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000011722d852401097006fa57fa4a3c9500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x204000, 0x0) 07:41:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) (async, rerun: 64) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async, rerun: 32) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 32) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async, rerun: 32) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup=r1, r0, 0x4, 0x1, r3}, 0x14) (rerun: 32) 07:41:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000001f000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2847.123431][T31535] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2847.131241][T31535] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2847.139052][T31535] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2847.146863][T31535] 07:41:55 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xdd00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000), 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000080)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x40) close(r1) (async) close(r0) 07:41:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0x40, 0xa5, 0x6, 0x0, 0x31e62810, 0x48020, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x200, 0x28c5, 0x16, 0x5, 0x800, 0x8, 0x7fff, 0x0, 0x3, 0x0, 0x100000001}, 0x0, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x2, 0x64, 0x4f, 0x6, 0x0, 0x1, 0x1a1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4f73, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0x2000, 0x7, 0x3, 0x1, 0x1, 0x8, 0x5, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x1, 0x80, 0xeb, 0x8, 0xea, 0x20, 0x0, 0x8, 0x8104, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x22, 0x0, 0x6, 0x3, 0x34, 0x7, 0x7fff, 0x0, 0x6, 0x0, 0x4}) 07:41:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) close(r1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=0x1, 0x4) close(r0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000080)="03ac0c0ddd866d52a5af090cfe18df9f213d19169c74bea776d55c70d65e17d595cca309301524c517", &(0x7f00000000c0)=""/156, &(0x7f0000000180)="7b6fff794cf044912524c0a82d9f47cd3467e5e9d95f6a3cf5ae11904787a60bf29382bba32c930f30d5759e3fa7f0215e0c1e8f633b1168cf8997d7d1981991803837c0dc9509ddc0fc142062be51e4a6ec189bcfabbc70818ba0ac9f2942c1f084", &(0x7f0000000200)="e5cef3b0d30787428b76751c59a0ba4d091b74a0f133e923bf003372ad438cb839b19a8abf263380a0a71e0cd5a5f2a64ff5c8e07125a18d25daaaa151e44938b9dc9479cc9709aaaac9537b5be991176f9b7cecba230f8c18fc8d470eec2713bc7085b0df5699820589c692f67e326babefd7c6d2d517ec", 0x2, 0xffffffffffffffff, 0x4}, 0x38) 07:41:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) close(r1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=0x1, 0x4) close(r0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000080)="03ac0c0ddd866d52a5af090cfe18df9f213d19169c74bea776d55c70d65e17d595cca309301524c517", &(0x7f00000000c0)=""/156, &(0x7f0000000180)="7b6fff794cf044912524c0a82d9f47cd3467e5e9d95f6a3cf5ae11904787a60bf29382bba32c930f30d5759e3fa7f0215e0c1e8f633b1168cf8997d7d1981991803837c0dc9509ddc0fc142062be51e4a6ec189bcfabbc70818ba0ac9f2942c1f084", &(0x7f0000000200)="e5cef3b0d30787428b76751c59a0ba4d091b74a0f133e923bf003372ad438cb839b19a8abf263380a0a71e0cd5a5f2a64ff5c8e07125a18d25daaaa151e44938b9dc9479cc9709aaaac9537b5be991176f9b7cecba230f8c18fc8d470eec2713bc7085b0df5699820589c692f67e326babefd7c6d2d517ec", 0x2, 0xffffffffffffffff, 0x4}, 0x38) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) (async) close(r1) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=0x1, 0x4) (async) close(r0) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000080)="03ac0c0ddd866d52a5af090cfe18df9f213d19169c74bea776d55c70d65e17d595cca309301524c517", &(0x7f00000000c0)=""/156, &(0x7f0000000180)="7b6fff794cf044912524c0a82d9f47cd3467e5e9d95f6a3cf5ae11904787a60bf29382bba32c930f30d5759e3fa7f0215e0c1e8f633b1168cf8997d7d1981991803837c0dc9509ddc0fc142062be51e4a6ec189bcfabbc70818ba0ac9f2942c1f084", &(0x7f0000000200)="e5cef3b0d30787428b76751c59a0ba4d091b74a0f133e923bf003372ad438cb839b19a8abf263380a0a71e0cd5a5f2a64ff5c8e07125a18d25daaaa151e44938b9dc9479cc9709aaaac9537b5be991176f9b7cecba230f8c18fc8d470eec2713bc7085b0df5699820589c692f67e326babefd7c6d2d517ec", 0x2, 0xffffffffffffffff, 0x4}, 0x38) (async) [ 2847.187356][T31583] FAULT_INJECTION: forcing a failure. [ 2847.187356][T31583] name failslab, interval 1, probability 0, space 0, times 0 [ 2847.203241][T31583] CPU: 1 PID: 31583 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2847.213309][T31583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2847.223203][T31583] Call Trace: [ 2847.226326][T31583] [ 2847.229103][T31583] dump_stack_lvl+0x151/0x1b7 [ 2847.233619][T31583] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2847.238912][T31583] dump_stack+0x15/0x17 [ 2847.242904][T31583] should_fail+0x3c0/0x510 [ 2847.247159][T31583] __should_failslab+0x9f/0xe0 [ 2847.251758][T31583] should_failslab+0x9/0x20 [ 2847.256096][T31583] kmem_cache_alloc+0x4f/0x2f0 [ 2847.260698][T31583] ? dup_mm+0x29/0x330 [ 2847.264598][T31583] dup_mm+0x29/0x330 [ 2847.268332][T31583] copy_mm+0x108/0x1b0 [ 2847.272232][T31583] copy_process+0x1295/0x3250 [ 2847.276748][T31583] ? proc_fail_nth_write+0x213/0x290 [ 2847.281868][T31583] ? proc_fail_nth_read+0x220/0x220 [ 2847.286901][T31583] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2847.291848][T31583] ? vfs_write+0x9af/0x1050 [ 2847.296188][T31583] ? vmacache_update+0xb7/0x120 [ 2847.300878][T31583] kernel_clone+0x22d/0x990 [ 2847.305214][T31583] ? file_end_write+0x1b0/0x1b0 [ 2847.309901][T31583] ? __kasan_check_write+0x14/0x20 [ 2847.314847][T31583] ? create_io_thread+0x1e0/0x1e0 [ 2847.319715][T31583] ? __mutex_lock_slowpath+0x10/0x10 [ 2847.324832][T31583] __x64_sys_clone+0x289/0x310 [ 2847.329429][T31583] ? __do_sys_vfork+0x130/0x130 [ 2847.334118][T31583] ? debug_smp_processor_id+0x17/0x20 [ 2847.339324][T31583] do_syscall_64+0x44/0xd0 [ 2847.343576][T31583] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2847.349303][T31583] RIP: 0033:0x7f4243ed90d9 [ 2847.353557][T31583] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2847.372998][T31583] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 07:41:55 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 29) 07:41:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0x40, 0xa5, 0x6, 0x0, 0x31e62810, 0x48020, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x200, 0x28c5, 0x16, 0x5, 0x800, 0x8, 0x7fff, 0x0, 0x3, 0x0, 0x100000001}, 0x0, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x2, 0x64, 0x4f, 0x6, 0x0, 0x1, 0x1a1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4f73, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0x2000, 0x7, 0x3, 0x1, 0x1, 0x8, 0x5, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x1, 0x80, 0xeb, 0x8, 0xea, 0x20, 0x0, 0x8, 0x8104, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x22, 0x0, 0x6, 0x3, 0x34, 0x7, 0x7fff, 0x0, 0x6, 0x0, 0x4}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0x40, 0xa5, 0x6, 0x0, 0x31e62810, 0x48020, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x200, 0x28c5, 0x16, 0x5, 0x800, 0x8, 0x7fff, 0x0, 0x3, 0x0, 0x100000001}, 0x0, 0x1, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x2, 0x64, 0x4f, 0x6, 0x0, 0x1, 0x1a1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4f73, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0x2000, 0x7, 0x3, 0x1, 0x1, 0x8, 0x5, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0xb) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x1, 0x80, 0xeb, 0x8, 0xea, 0x20, 0x0, 0x8, 0x8104, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x22, 0x0, 0x6, 0x3, 0x34, 0x7, 0x7fff, 0x0, 0x6, 0x0, 0x4}) (async) 07:41:55 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xf000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) (async) close(r1) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=0x1, 0x4) (async) close(r0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000080)="03ac0c0ddd866d52a5af090cfe18df9f213d19169c74bea776d55c70d65e17d595cca309301524c517", &(0x7f00000000c0)=""/156, &(0x7f0000000180)="7b6fff794cf044912524c0a82d9f47cd3467e5e9d95f6a3cf5ae11904787a60bf29382bba32c930f30d5759e3fa7f0215e0c1e8f633b1168cf8997d7d1981991803837c0dc9509ddc0fc142062be51e4a6ec189bcfabbc70818ba0ac9f2942c1f084", &(0x7f0000000200)="e5cef3b0d30787428b76751c59a0ba4d091b74a0f133e923bf003372ad438cb839b19a8abf263380a0a71e0cd5a5f2a64ff5c8e07125a18d25daaaa151e44938b9dc9479cc9709aaaac9537b5be991176f9b7cecba230f8c18fc8d470eec2713bc7085b0df5699820589c692f67e326babefd7c6d2d517ec", 0x2, 0xffffffffffffffff, 0x4}, 0x38) 07:41:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000020000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup=r1, r0, 0x4, 0x1, r3}, 0x14) 07:41:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000025000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0x40, 0xa5, 0x6, 0x0, 0x31e62810, 0x48020, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x200, 0x28c5, 0x16, 0x5, 0x800, 0x8, 0x7fff, 0x0, 0x3, 0x0, 0x100000001}, 0x0, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x2, 0x64, 0x4f, 0x6, 0x0, 0x1, 0x1a1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4f73, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0x2000, 0x7, 0x3, 0x1, 0x1, 0x8, 0x5, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x1, 0x80, 0xeb, 0x8, 0xea, 0x20, 0x0, 0x8, 0x8104, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x22, 0x0, 0x6, 0x3, 0x34, 0x7, 0x7fff, 0x0, 0x6, 0x0, 0x4}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0x40, 0xa5, 0x6, 0x0, 0x31e62810, 0x48020, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x200, 0x28c5, 0x16, 0x5, 0x800, 0x8, 0x7fff, 0x0, 0x3, 0x0, 0x100000001}, 0x0, 0x1, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x2, 0x64, 0x4f, 0x6, 0x0, 0x1, 0x1a1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4f73, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0x2000, 0x7, 0x3, 0x1, 0x1, 0x8, 0x5, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0xb) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x1, 0x80, 0xeb, 0x8, 0xea, 0x20, 0x0, 0x8, 0x8104, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x22, 0x0, 0x6, 0x3, 0x34, 0x7, 0x7fff, 0x0, 0x6, 0x0, 0x4}) (async) 07:41:55 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xfb03, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2847.381260][T31583] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2847.389055][T31583] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2847.396863][T31583] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2847.404675][T31583] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2847.412488][T31583] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2847.420301][T31583] 07:41:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000003c000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) close(r0) 07:41:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r1) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) (async) close(r0) (async) [ 2847.466583][T31624] FAULT_INJECTION: forcing a failure. [ 2847.466583][T31624] name failslab, interval 1, probability 0, space 0, times 0 [ 2847.501204][T31624] CPU: 1 PID: 31624 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2847.511277][T31624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2847.521173][T31624] Call Trace: [ 2847.524298][T31624] [ 2847.527074][T31624] dump_stack_lvl+0x151/0x1b7 [ 2847.531586][T31624] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2847.536884][T31624] dump_stack+0x15/0x17 [ 2847.540870][T31624] should_fail+0x3c0/0x510 [ 2847.545124][T31624] __should_failslab+0x9f/0xe0 [ 2847.549727][T31624] should_failslab+0x9/0x20 [ 2847.554061][T31624] kmem_cache_alloc+0x4f/0x2f0 [ 2847.558661][T31624] ? dup_mm+0x29/0x330 [ 2847.562567][T31624] dup_mm+0x29/0x330 [ 2847.566299][T31624] copy_mm+0x108/0x1b0 [ 2847.570203][T31624] copy_process+0x1295/0x3250 [ 2847.574720][T31624] ? proc_fail_nth_write+0x213/0x290 [ 2847.579843][T31624] ? proc_fail_nth_read+0x220/0x220 [ 2847.584870][T31624] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2847.589820][T31624] ? vfs_write+0x9af/0x1050 [ 2847.594157][T31624] ? vmacache_update+0xb7/0x120 [ 2847.598846][T31624] kernel_clone+0x22d/0x990 [ 2847.603183][T31624] ? file_end_write+0x1b0/0x1b0 [ 2847.607872][T31624] ? __kasan_check_write+0x14/0x20 [ 2847.612818][T31624] ? create_io_thread+0x1e0/0x1e0 [ 2847.617679][T31624] ? __mutex_lock_slowpath+0x10/0x10 [ 2847.622800][T31624] __x64_sys_clone+0x289/0x310 [ 2847.627401][T31624] ? __do_sys_vfork+0x130/0x130 [ 2847.632085][T31624] ? debug_smp_processor_id+0x17/0x20 [ 2847.637293][T31624] do_syscall_64+0x44/0xd0 [ 2847.641546][T31624] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2847.647276][T31624] RIP: 0033:0x7f4243ed90d9 [ 2847.651529][T31624] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2847.670969][T31624] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2847.679212][T31624] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2847.687025][T31624] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2847.694837][T31624] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2847.702648][T31624] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:41:56 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 30) 07:41:56 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x200, 0x80804, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x3505, 0x5, 0x5, 0x8, 0x5, 0x4, 0x3118, 0x0, 0xff, 0x0, 0x2}, r0, 0xb, 0xffffffffffffffff, 0x7) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:56 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x1, 0x0, 0xfa, 0xa9, 0x0, 0x100000000, 0x10, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3e, 0x1, @perf_config_ext={0xd65, 0x100000001}, 0x2000, 0x7, 0x7, 0x2, 0xd4d, 0x7fffffff, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x0, 0x8, r0, 0x9) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) openat$cgroup_int(r0, &(0x7f0000000000)='memory.low\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffb}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x40f00, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xff00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) (async) close(r0) 07:41:56 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000003f000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x1, 0x0, 0xfa, 0xa9, 0x0, 0x100000000, 0x10, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3e, 0x1, @perf_config_ext={0xd65, 0x100000001}, 0x2000, 0x7, 0x7, 0x2, 0xd4d, 0x7fffffff, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x0, 0x8, r0, 0x9) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) openat$cgroup_int(r0, &(0x7f0000000000)='memory.low\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffb}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x40f00, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r2}, 0x10) close(r0) 07:41:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x1ac5c8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2847.710458][T31624] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2847.718270][T31624] 07:41:56 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000040000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x200000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x1, 0x0, 0xfa, 0xa9, 0x0, 0x100000000, 0x10, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3e, 0x1, @perf_config_ext={0xd65, 0x100000001}, 0x2000, 0x7, 0x7, 0x2, 0xd4d, 0x7fffffff, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x0, 0x8, r0, 0x9) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) openat$cgroup_int(r0, &(0x7f0000000000)='memory.low\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffb}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x40f00, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x1, 0x0, 0xfa, 0xa9, 0x0, 0x100000000, 0x10, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3e, 0x1, @perf_config_ext={0xd65, 0x100000001}, 0x2000, 0x7, 0x7, 0x2, 0xd4d, 0x7fffffff, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x0, 0x8, r0, 0x9) (async) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) (async) openat$cgroup_int(r0, &(0x7f0000000000)='memory.low\x00', 0x2, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffb}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x40f00, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) [ 2847.749691][T31657] FAULT_INJECTION: forcing a failure. [ 2847.749691][T31657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2847.765862][T31657] CPU: 1 PID: 31657 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2847.775928][T31657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2847.785822][T31657] Call Trace: [ 2847.788948][T31657] [ 2847.791722][T31657] dump_stack_lvl+0x151/0x1b7 [ 2847.796237][T31657] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2847.801530][T31657] ? __kasan_check_write+0x14/0x20 [ 2847.806477][T31657] ? __set_page_owner+0x2ee/0x310 [ 2847.811338][T31657] dump_stack+0x15/0x17 [ 2847.815330][T31657] should_fail+0x3c0/0x510 [ 2847.819583][T31657] should_fail_alloc_page+0x58/0x70 [ 2847.824615][T31657] __alloc_pages+0x1de/0x7c0 [ 2847.829039][T31657] ? __count_vm_events+0x30/0x30 [ 2847.833812][T31657] ? __count_vm_events+0x30/0x30 [ 2847.838587][T31657] ? __kasan_check_write+0x14/0x20 [ 2847.843535][T31657] ? _raw_spin_lock+0xa3/0x1b0 [ 2847.848136][T31657] __pmd_alloc+0xb1/0x550 [ 2847.852299][T31657] ? kmem_cache_alloc+0x189/0x2f0 [ 2847.857159][T31657] ? anon_vma_fork+0x1b9/0x4f0 [ 2847.861758][T31657] ? __pud_alloc+0x260/0x260 [ 2847.866190][T31657] ? __pud_alloc+0x218/0x260 [ 2847.870616][T31657] ? do_handle_mm_fault+0x2370/0x2370 [ 2847.875822][T31657] copy_page_range+0xd04/0x1090 [ 2847.880511][T31657] ? pfn_valid+0x1e0/0x1e0 [ 2847.884759][T31657] dup_mmap+0x99f/0xea0 [ 2847.888752][T31657] ? __delayed_free_task+0x20/0x20 [ 2847.893699][T31657] ? mm_init+0x807/0x960 [ 2847.897777][T31657] dup_mm+0x91/0x330 [ 2847.901512][T31657] copy_mm+0x108/0x1b0 [ 2847.905425][T31657] copy_process+0x1295/0x3250 [ 2847.909929][T31657] ? proc_fail_nth_write+0x213/0x290 [ 2847.915053][T31657] ? proc_fail_nth_read+0x220/0x220 [ 2847.920085][T31657] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2847.925030][T31657] ? vfs_write+0x9af/0x1050 [ 2847.929371][T31657] ? vmacache_update+0xb7/0x120 [ 2847.934056][T31657] kernel_clone+0x22d/0x990 [ 2847.938400][T31657] ? file_end_write+0x1b0/0x1b0 [ 2847.943081][T31657] ? __kasan_check_write+0x14/0x20 [ 2847.948030][T31657] ? create_io_thread+0x1e0/0x1e0 [ 2847.952890][T31657] ? __mutex_lock_slowpath+0x10/0x10 [ 2847.958014][T31657] __x64_sys_clone+0x289/0x310 [ 2847.962616][T31657] ? __do_sys_vfork+0x130/0x130 [ 2847.967298][T31657] ? debug_smp_processor_id+0x17/0x20 [ 2847.972505][T31657] do_syscall_64+0x44/0xd0 [ 2847.976759][T31657] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2847.982486][T31657] RIP: 0033:0x7f4243ed90d9 [ 2847.986749][T31657] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2848.006180][T31657] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2848.014424][T31657] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2848.022234][T31657] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2848.030046][T31657] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2848.037856][T31657] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:41:56 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 31) 07:41:56 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x200, 0x80804, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x3505, 0x5, 0x5, 0x8, 0x5, 0x4, 0x3118, 0x0, 0xff, 0x0, 0x2}, r0, 0xb, 0xffffffffffffffff, 0x7) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:56 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000048000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5}}]}}, &(0x7f00000000c0)=""/158, 0x32, 0x9e, 0x1}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x1}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xe}, @jmp={0x5, 0x0, 0x1, 0x6, 0xa, 0xfffffffffffffffc, 0xffffffffffffffff}]}, &(0x7f0000000080)='GPL\x00', 0x5e, 0xbe, &(0x7f00000001c0)=""/190, 0x40f00, 0xc, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000280)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x10, 0x213, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r1, 0xffffffffffffffff]}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x1000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r2}, 0x10) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) close(r1) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x10}, 0x10) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x1ff) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x4) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r2}, 0x10) (async) close(r0) (async) 07:41:56 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5}}]}}, &(0x7f00000000c0)=""/158, 0x32, 0x9e, 0x1}, 0x20) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x1}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xe}, @jmp={0x5, 0x0, 0x1, 0x6, 0xa, 0xfffffffffffffffc, 0xffffffffffffffff}]}, &(0x7f0000000080)='GPL\x00', 0x5e, 0xbe, &(0x7f00000001c0)=""/190, 0x40f00, 0xc, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000280)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x10, 0x213, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r1, 0xffffffffffffffff]}, 0x80) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 07:41:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x1010000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async, rerun: 32) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x10}, 0x10) (rerun: 32) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x1ff) (async, rerun: 64) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x4) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r2}, 0x10) (async) close(r0) 07:41:56 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000004c000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5}}]}}, &(0x7f00000000c0)=""/158, 0x32, 0x9e, 0x1}, 0x20) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x1}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xe}, @jmp={0x5, 0x0, 0x1, 0x6, 0xa, 0xfffffffffffffffc, 0xffffffffffffffff}]}, &(0x7f0000000080)='GPL\x00', 0x5e, 0xbe, &(0x7f00000001c0)=""/190, 0x40f00, 0xc, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000280)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x10, 0x213, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[r1, 0xffffffffffffffff]}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (rerun: 32) 07:41:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x2000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2848.045670][T31657] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2848.053482][T31657] [ 2848.082425][T31679] FAULT_INJECTION: forcing a failure. [ 2848.082425][T31679] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2848.114178][T31679] CPU: 1 PID: 31679 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2848.124257][T31679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2848.134150][T31679] Call Trace: [ 2848.137273][T31679] [ 2848.140052][T31679] dump_stack_lvl+0x151/0x1b7 [ 2848.144566][T31679] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2848.149853][T31679] ? __kasan_check_write+0x14/0x20 [ 2848.154800][T31679] ? __set_page_owner+0x2ee/0x310 [ 2848.159661][T31679] dump_stack+0x15/0x17 [ 2848.163655][T31679] should_fail+0x3c0/0x510 [ 2848.167906][T31679] should_fail_alloc_page+0x58/0x70 [ 2848.172939][T31679] __alloc_pages+0x1de/0x7c0 [ 2848.177368][T31679] ? __count_vm_events+0x30/0x30 [ 2848.182140][T31679] ? __count_vm_events+0x30/0x30 [ 2848.186919][T31679] ? __kasan_check_write+0x14/0x20 [ 2848.191867][T31679] ? _raw_spin_lock+0xa3/0x1b0 [ 2848.196463][T31679] __pmd_alloc+0xb1/0x550 [ 2848.200629][T31679] ? kmem_cache_alloc+0x189/0x2f0 [ 2848.205486][T31679] ? anon_vma_fork+0x1b9/0x4f0 [ 2848.210096][T31679] ? __pud_alloc+0x260/0x260 [ 2848.214513][T31679] ? __pud_alloc+0x218/0x260 [ 2848.218940][T31679] ? do_handle_mm_fault+0x2370/0x2370 [ 2848.224148][T31679] copy_page_range+0xd04/0x1090 [ 2848.228835][T31679] ? pfn_valid+0x1e0/0x1e0 [ 2848.233089][T31679] dup_mmap+0x99f/0xea0 [ 2848.237081][T31679] ? __delayed_free_task+0x20/0x20 [ 2848.242026][T31679] ? mm_init+0x807/0x960 [ 2848.246107][T31679] dup_mm+0x91/0x330 [ 2848.249837][T31679] copy_mm+0x108/0x1b0 [ 2848.253743][T31679] copy_process+0x1295/0x3250 [ 2848.258260][T31679] ? proc_fail_nth_write+0x213/0x290 [ 2848.263376][T31679] ? proc_fail_nth_read+0x220/0x220 [ 2848.268410][T31679] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2848.273356][T31679] ? vfs_write+0x9af/0x1050 [ 2848.277697][T31679] ? vmacache_update+0xb7/0x120 [ 2848.282385][T31679] kernel_clone+0x22d/0x990 [ 2848.286721][T31679] ? file_end_write+0x1b0/0x1b0 [ 2848.291409][T31679] ? __kasan_check_write+0x14/0x20 [ 2848.296356][T31679] ? create_io_thread+0x1e0/0x1e0 [ 2848.301219][T31679] ? __mutex_lock_slowpath+0x10/0x10 [ 2848.306348][T31679] __x64_sys_clone+0x289/0x310 [ 2848.310945][T31679] ? __do_sys_vfork+0x130/0x130 [ 2848.315627][T31679] ? debug_smp_processor_id+0x17/0x20 [ 2848.320831][T31679] do_syscall_64+0x44/0xd0 [ 2848.325084][T31679] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2848.330817][T31679] RIP: 0033:0x7f4243ed90d9 [ 2848.335068][T31679] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2848.354941][T31679] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 07:41:56 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 32) 07:41:56 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x200, 0x80804, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x3505, 0x5, 0x5, 0x8, 0x5, 0x4, 0x3118, 0x0, 0xff, 0x0, 0x2}, r0, 0xb, 0xffffffffffffffff, 0x7) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:56 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000061000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x2, 0x8}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x7, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x9, 0xb, 0xb, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, @ldst={0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffe0, 0xffffffffffffffff}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xe}, @alu={0x0, 0x1, 0x6, 0x1, 0x1, 0x275, 0x1}], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, &(0x7f0000000080), 0x41000, 0xa, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0xd, 0x1, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x1, r0, 0x1]}, 0x80) 07:41:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffff) close(r1) close(r0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000006565f2de453500638595004fb500007f051811000098a975f16a214d4abe96c8757098e268e1832179c65d0d9757dd8882eaea4ef7ef6563256109387614997d549e148efc3313015c1991d8f90cec7e5c3a7a420145c696ab4afe8b6b3e0d5cae498b16", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000040)='syzkaller\x00', 0x9, 0xde, &(0x7f0000000080)=""/222, 0x40f00, 0x8, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x7, 0x8c, 0xa8f9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000002c0)={r2, 0xffffffffffffffff, 0x15}, 0x10) 07:41:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x3000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000062000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x4000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2848.363189][T31679] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2848.370997][T31679] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2848.378809][T31679] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2848.386624][T31679] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2848.394433][T31679] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2848.402250][T31679] 07:41:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async, rerun: 64) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x2, 0x8}, 0xc) (rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x7, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x9, 0xb, 0xb, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, @ldst={0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffe0, 0xffffffffffffffff}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xe}, @alu={0x0, 0x1, 0x6, 0x1, 0x1, 0x275, 0x1}], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, &(0x7f0000000080), 0x41000, 0xa, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0xd, 0x1, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x1, r0, 0x1]}, 0x80) 07:41:56 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x5000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000063000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffff) close(r1) close(r0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000006565f2de453500638595004fb500007f051811000098a975f16a214d4abe96c8757098e268e1832179c65d0d9757dd8882eaea4ef7ef6563256109387614997d549e148efc3313015c1991d8f90cec7e5c3a7a420145c696ab4afe8b6b3e0d5cae498b16", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000040)='syzkaller\x00', 0x9, 0xde, &(0x7f0000000080)=""/222, 0x40f00, 0x8, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x7, 0x8c, 0xa8f9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000002c0)={r2, 0xffffffffffffffff, 0x15}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffff) (async) close(r1) (async) close(r0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000006565f2de453500638595004fb500007f051811000098a975f16a214d4abe96c8757098e268e1832179c65d0d9757dd8882eaea4ef7ef6563256109387614997d549e148efc3313015c1991d8f90cec7e5c3a7a420145c696ab4afe8b6b3e0d5cae498b16", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000040)='syzkaller\x00', 0x9, 0xde, &(0x7f0000000080)=""/222, 0x40f00, 0x8, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x7, 0x8c, 0xa8f9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000002c0)={r2, 0xffffffffffffffff, 0x15}, 0x10) (async) [ 2848.438721][T31725] FAULT_INJECTION: forcing a failure. [ 2848.438721][T31725] name failslab, interval 1, probability 0, space 0, times 0 [ 2848.459281][T31725] CPU: 1 PID: 31725 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2848.469347][T31725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2848.479245][T31725] Call Trace: [ 2848.482368][T31725] [ 2848.485142][T31725] dump_stack_lvl+0x151/0x1b7 [ 2848.489665][T31725] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2848.494956][T31725] dump_stack+0x15/0x17 [ 2848.498942][T31725] should_fail+0x3c0/0x510 [ 2848.503194][T31725] __should_failslab+0x9f/0xe0 [ 2848.507792][T31725] should_failslab+0x9/0x20 [ 2848.512133][T31725] kmem_cache_alloc+0x4f/0x2f0 [ 2848.516730][T31725] ? vm_area_dup+0x26/0x1d0 [ 2848.521069][T31725] vm_area_dup+0x26/0x1d0 [ 2848.525236][T31725] dup_mmap+0x6b8/0xea0 [ 2848.529233][T31725] ? __delayed_free_task+0x20/0x20 [ 2848.534178][T31725] ? mm_init+0x807/0x960 [ 2848.538254][T31725] dup_mm+0x91/0x330 [ 2848.541986][T31725] copy_mm+0x108/0x1b0 [ 2848.545892][T31725] copy_process+0x1295/0x3250 [ 2848.550405][T31725] ? proc_fail_nth_write+0x213/0x290 [ 2848.555527][T31725] ? proc_fail_nth_read+0x220/0x220 [ 2848.560563][T31725] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2848.565508][T31725] ? vfs_write+0x9af/0x1050 [ 2848.569847][T31725] ? vmacache_update+0xb7/0x120 [ 2848.574537][T31725] kernel_clone+0x22d/0x990 [ 2848.578877][T31725] ? file_end_write+0x1b0/0x1b0 [ 2848.583561][T31725] ? __kasan_check_write+0x14/0x20 [ 2848.588509][T31725] ? create_io_thread+0x1e0/0x1e0 [ 2848.593367][T31725] ? __mutex_lock_slowpath+0x10/0x10 [ 2848.598490][T31725] __x64_sys_clone+0x289/0x310 [ 2848.603089][T31725] ? __do_sys_vfork+0x130/0x130 [ 2848.607776][T31725] ? debug_smp_processor_id+0x17/0x20 [ 2848.612982][T31725] do_syscall_64+0x44/0xd0 [ 2848.617235][T31725] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2848.622964][T31725] RIP: 0033:0x7f4243ed90d9 [ 2848.627217][T31725] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2848.646658][T31725] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2848.654901][T31725] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2848.662713][T31725] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2848.670526][T31725] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2848.678337][T31725] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:41:57 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 33) 07:41:57 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x8, 0x20, 0x1b, 0x2e, 0x0, 0x0, 0x80, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp={&(0x7f0000000080), 0x9}, 0x500, 0xe61, 0x5, 0x1, 0x76cf, 0x4, 0x0, 0x0, 0xf33, 0x0, 0x400}, r2, 0xc, r1, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r3 = openat$cgroup_ro(r2, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000200), 0x2, 0x0) 07:41:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x2, 0x8}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x7, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x9, 0xb, 0xb, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, @ldst={0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffe0, 0xffffffffffffffff}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xe}, @alu={0x0, 0x1, 0x6, 0x1, 0x1, 0x275, 0x1}], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, &(0x7f0000000080), 0x41000, 0xa, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0xd, 0x1, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x1, r0, 0x1]}, 0x80) 07:41:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x5010000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffff) close(r1) close(r0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000006565f2de453500638595004fb500007f051811000098a975f16a214d4abe96c8757098e268e1832179c65d0d9757dd8882eaea4ef7ef6563256109387614997d549e148efc3313015c1991d8f90cec7e5c3a7a420145c696ab4afe8b6b3e0d5cae498b16", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000040)='syzkaller\x00', 0x9, 0xde, &(0x7f0000000080)=""/222, 0x40f00, 0x8, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x7, 0x8c, 0xa8f9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000002c0)={r2, 0xffffffffffffffff, 0x15}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffff) (async) close(r1) (async) close(r0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000006565f2de453500638595004fb500007f051811000098a975f16a214d4abe96c8757098e268e1832179c65d0d9757dd8882eaea4ef7ef6563256109387614997d549e148efc3313015c1991d8f90cec7e5c3a7a420145c696ab4afe8b6b3e0d5cae498b16", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000040)='syzkaller\x00', 0x9, 0xde, &(0x7f0000000080)=""/222, 0x40f00, 0x8, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x7, 0x8c, 0xa8f9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000002c0)={r2, 0xffffffffffffffff, 0x15}, 0x10) (async) 07:41:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000068000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 07:41:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'vcan0\x00', 0x400}) 07:41:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000069000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x6000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2848.686147][T31725] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2848.693961][T31725] 07:41:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 07:41:57 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x8, 0x20, 0x1b, 0x2e, 0x0, 0x0, 0x80, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp={&(0x7f0000000080), 0x9}, 0x500, 0xe61, 0x5, 0x1, 0x76cf, 0x4, 0x0, 0x0, 0xf33, 0x0, 0x400}, r2, 0xc, r1, 0x8) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r3 = openat$cgroup_ro(r2, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000200), 0x2, 0x0) [ 2848.733866][T31763] FAULT_INJECTION: forcing a failure. [ 2848.733866][T31763] name failslab, interval 1, probability 0, space 0, times 0 [ 2848.758291][T31763] CPU: 1 PID: 31763 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2848.768368][T31763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2848.778263][T31763] Call Trace: [ 2848.781382][T31763] [ 2848.784163][T31763] dump_stack_lvl+0x151/0x1b7 [ 2848.788672][T31763] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2848.793963][T31763] dump_stack+0x15/0x17 [ 2848.797954][T31763] should_fail+0x3c0/0x510 [ 2848.802208][T31763] __should_failslab+0x9f/0xe0 [ 2848.806810][T31763] should_failslab+0x9/0x20 [ 2848.811146][T31763] kmem_cache_alloc+0x4f/0x2f0 [ 2848.815748][T31763] ? vm_area_dup+0x26/0x1d0 [ 2848.820085][T31763] ? __kasan_check_read+0x11/0x20 [ 2848.824948][T31763] vm_area_dup+0x26/0x1d0 [ 2848.829115][T31763] dup_mmap+0x6b8/0xea0 [ 2848.833106][T31763] ? __delayed_free_task+0x20/0x20 [ 2848.838053][T31763] ? mm_init+0x807/0x960 [ 2848.842138][T31763] dup_mm+0x91/0x330 [ 2848.845863][T31763] copy_mm+0x108/0x1b0 [ 2848.849769][T31763] copy_process+0x1295/0x3250 [ 2848.854282][T31763] ? proc_fail_nth_write+0x213/0x290 [ 2848.859406][T31763] ? proc_fail_nth_read+0x220/0x220 [ 2848.864440][T31763] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2848.869385][T31763] ? vfs_write+0x9af/0x1050 [ 2848.873724][T31763] ? vmacache_update+0xb7/0x120 [ 2848.878417][T31763] kernel_clone+0x22d/0x990 [ 2848.882750][T31763] ? file_end_write+0x1b0/0x1b0 [ 2848.887441][T31763] ? __kasan_check_write+0x14/0x20 [ 2848.892385][T31763] ? create_io_thread+0x1e0/0x1e0 [ 2848.897247][T31763] ? __mutex_lock_slowpath+0x10/0x10 [ 2848.902367][T31763] __x64_sys_clone+0x289/0x310 [ 2848.906969][T31763] ? __do_sys_vfork+0x130/0x130 [ 2848.911654][T31763] ? debug_smp_processor_id+0x17/0x20 [ 2848.916859][T31763] do_syscall_64+0x44/0xd0 [ 2848.921114][T31763] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2848.926839][T31763] RIP: 0033:0x7f4243ed90d9 [ 2848.931093][T31763] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2848.950536][T31763] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2848.958778][T31763] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2848.966589][T31763] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2848.974403][T31763] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:41:57 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 34) 07:41:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x7000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000006a000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'vcan0\x00', 0x400}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'vcan0\x00', 0x400}) (async) 07:41:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 07:41:57 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x8, 0x20, 0x1b, 0x2e, 0x0, 0x0, 0x80, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp={&(0x7f0000000080), 0x9}, 0x500, 0xe61, 0x5, 0x1, 0x76cf, 0x4, 0x0, 0x0, 0xf33, 0x0, 0x400}, r2, 0xc, r1, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r3 = openat$cgroup_ro(r2, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000200), 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) getpid() (async) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) (async) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x8, 0x20, 0x1b, 0x2e, 0x0, 0x0, 0x80, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp={&(0x7f0000000080), 0x9}, 0x500, 0xe61, 0x5, 0x1, 0x76cf, 0x4, 0x0, 0x0, 0xf33, 0x0, 0x400}, r2, 0xc, r1, 0x8) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) (async) openat$cgroup_ro(r2, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000200), 0x2, 0x0) (async) 07:41:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x8000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2848.982212][T31763] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2848.990024][T31763] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2848.997837][T31763] 07:41:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000006b000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'vcan0\x00', 0x400}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'vcan0\x00', 0x400}) (async) 07:41:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r2, 0x4) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8003}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xb8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xa2}, @ldst={0x0, 0x0, 0x3, 0x8, 0x9, 0x4, 0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x400, 0x56, &(0x7f0000000100)=""/86, 0x41000, 0x18, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f00000001c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x4, 0x81, 0xe3e9}, 0x10, r2, 0x0, 0x0, &(0x7f0000000300)=[0x1, r3, r4, r0, r0]}, 0x80) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x0, 0x0) 07:41:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000006c000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x9000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2849.030471][T31788] FAULT_INJECTION: forcing a failure. [ 2849.030471][T31788] name failslab, interval 1, probability 0, space 0, times 0 [ 2849.079865][T31788] CPU: 0 PID: 31788 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2849.089944][T31788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2849.099834][T31788] Call Trace: [ 2849.102956][T31788] [ 2849.105734][T31788] dump_stack_lvl+0x151/0x1b7 [ 2849.110246][T31788] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2849.115544][T31788] dump_stack+0x15/0x17 [ 2849.119531][T31788] should_fail+0x3c0/0x510 [ 2849.123785][T31788] __should_failslab+0x9f/0xe0 [ 2849.128385][T31788] should_failslab+0x9/0x20 [ 2849.132726][T31788] kmem_cache_alloc+0x4f/0x2f0 [ 2849.137324][T31788] ? vm_area_dup+0x26/0x1d0 [ 2849.141663][T31788] vm_area_dup+0x26/0x1d0 [ 2849.145829][T31788] dup_mmap+0x6b8/0xea0 [ 2849.149826][T31788] ? __delayed_free_task+0x20/0x20 [ 2849.154769][T31788] ? mm_init+0x807/0x960 [ 2849.158848][T31788] dup_mm+0x91/0x330 [ 2849.162581][T31788] copy_mm+0x108/0x1b0 [ 2849.166486][T31788] copy_process+0x1295/0x3250 [ 2849.170999][T31788] ? proc_fail_nth_write+0x213/0x290 [ 2849.176122][T31788] ? proc_fail_nth_read+0x220/0x220 [ 2849.181155][T31788] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2849.186100][T31788] ? vfs_write+0x9af/0x1050 [ 2849.190441][T31788] ? vmacache_update+0xb7/0x120 [ 2849.195127][T31788] kernel_clone+0x22d/0x990 [ 2849.199468][T31788] ? file_end_write+0x1b0/0x1b0 [ 2849.204155][T31788] ? __kasan_check_write+0x14/0x20 [ 2849.209101][T31788] ? create_io_thread+0x1e0/0x1e0 [ 2849.213962][T31788] ? __mutex_lock_slowpath+0x10/0x10 [ 2849.219084][T31788] __x64_sys_clone+0x289/0x310 [ 2849.223682][T31788] ? __do_sys_vfork+0x130/0x130 [ 2849.228370][T31788] ? debug_smp_processor_id+0x17/0x20 [ 2849.233582][T31788] do_syscall_64+0x44/0xd0 [ 2849.237830][T31788] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2849.243559][T31788] RIP: 0033:0x7f4243ed90d9 [ 2849.247813][T31788] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2849.267252][T31788] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 07:41:57 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 35) 07:41:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000071000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 07:41:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r2, 0x4) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8003}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xb8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xa2}, @ldst={0x0, 0x0, 0x3, 0x8, 0x9, 0x4, 0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x400, 0x56, &(0x7f0000000100)=""/86, 0x41000, 0x18, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f00000001c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x4, 0x81, 0xe3e9}, 0x10, r2, 0x0, 0x0, &(0x7f0000000300)=[0x1, r3, r4, r0, r0]}, 0x80) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.bfq.io_queued\x00', 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r2, 0x4) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) (async) openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8003}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xb8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xa2}, @ldst={0x0, 0x0, 0x3, 0x8, 0x9, 0x4, 0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x400, 0x56, &(0x7f0000000100)=""/86, 0x41000, 0x18, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f00000001c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x4, 0x81, 0xe3e9}, 0x10, r2, 0x0, 0x0, &(0x7f0000000300)=[0x1, r3, r4, r0, r0]}, 0x80) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x0, 0x0) (async) 07:41:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x20, 0xff, 0x80, 0x30, 0x0, 0x5, 0x64442, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffeffff, 0x2, @perf_bp={&(0x7f0000000100)}, 0x90444, 0x8, 0xba2, 0x5, 0x7fff, 0x1ff, 0x7b7, 0x0, 0x1, 0x0, 0x8000000000000001}, 0x0, 0x4, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) close(r1) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x400001, 0x0) 07:41:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x9020000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2849.275498][T31788] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2849.283309][T31788] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2849.291117][T31788] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2849.298930][T31788] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2849.306740][T31788] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2849.314553][T31788] 07:41:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xa000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000072000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2849.336514][T31826] FAULT_INJECTION: forcing a failure. [ 2849.336514][T31826] name failslab, interval 1, probability 0, space 0, times 0 [ 2849.349375][T31826] CPU: 0 PID: 31826 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2849.359438][T31826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2849.369336][T31826] Call Trace: [ 2849.372458][T31826] [ 2849.375232][T31826] dump_stack_lvl+0x151/0x1b7 [ 2849.379746][T31826] ? bfq_pos_tree_add_move+0x43e/0x43e 07:41:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x20, 0xff, 0x80, 0x30, 0x0, 0x5, 0x64442, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffeffff, 0x2, @perf_bp={&(0x7f0000000100)}, 0x90444, 0x8, 0xba2, 0x5, 0x7fff, 0x1ff, 0x7b7, 0x0, 0x1, 0x0, 0x8000000000000001}, 0x0, 0x4, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) (async) close(r1) (async) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x400001, 0x0) 07:41:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xb000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x20, 0xff, 0x80, 0x30, 0x0, 0x5, 0x64442, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffeffff, 0x2, @perf_bp={&(0x7f0000000100)}, 0x90444, 0x8, 0xba2, 0x5, 0x7fff, 0x1ff, 0x7b7, 0x0, 0x1, 0x0, 0x8000000000000001}, 0x0, 0x4, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) (async) close(r1) (async) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x400001, 0x0) 07:41:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xc000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2849.385042][T31826] dump_stack+0x15/0x17 [ 2849.389034][T31826] should_fail+0x3c0/0x510 [ 2849.393290][T31826] __should_failslab+0x9f/0xe0 [ 2849.397887][T31826] should_failslab+0x9/0x20 [ 2849.402226][T31826] kmem_cache_alloc+0x4f/0x2f0 [ 2849.406824][T31826] ? vm_area_dup+0x26/0x1d0 [ 2849.411164][T31826] vm_area_dup+0x26/0x1d0 [ 2849.415331][T31826] dup_mmap+0x6b8/0xea0 [ 2849.419327][T31826] ? __delayed_free_task+0x20/0x20 [ 2849.424271][T31826] ? mm_init+0x807/0x960 [ 2849.428352][T31826] dup_mm+0x91/0x330 [ 2849.432080][T31826] copy_mm+0x108/0x1b0 [ 2849.435985][T31826] copy_process+0x1295/0x3250 [ 2849.440500][T31826] ? proc_fail_nth_write+0x213/0x290 [ 2849.445617][T31826] ? proc_fail_nth_read+0x220/0x220 [ 2849.450650][T31826] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2849.455597][T31826] ? vfs_write+0x9af/0x1050 [ 2849.459936][T31826] ? vmacache_update+0xb7/0x120 [ 2849.464622][T31826] kernel_clone+0x22d/0x990 [ 2849.468962][T31826] ? file_end_write+0x1b0/0x1b0 [ 2849.473649][T31826] ? __kasan_check_write+0x14/0x20 [ 2849.478595][T31826] ? create_io_thread+0x1e0/0x1e0 [ 2849.483458][T31826] ? __mutex_lock_slowpath+0x10/0x10 [ 2849.488577][T31826] __x64_sys_clone+0x289/0x310 [ 2849.493178][T31826] ? __do_sys_vfork+0x130/0x130 [ 2849.497866][T31826] ? debug_smp_processor_id+0x17/0x20 [ 2849.503072][T31826] do_syscall_64+0x44/0xd0 [ 2849.507326][T31826] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2849.513052][T31826] RIP: 0033:0x7f4243ed90d9 [ 2849.517308][T31826] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:41:57 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36) 07:41:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xd000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x14, 0x81, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="85100000faffffff18310000030000000000000000000000000000e3c4fe45039acadbbd8cb4097bc520225c81a9526d382755a5e1e64402383e305454be16caf46439"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) close(r1) close(r0) 07:41:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000073000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=@framed, &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.bfq.io_queued\x00', 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r2, 0x4) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8003}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xb8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xa2}, @ldst={0x0, 0x0, 0x3, 0x8, 0x9, 0x4, 0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x400, 0x56, &(0x7f0000000100)=""/86, 0x41000, 0x18, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f00000001c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x4, 0x81, 0xe3e9}, 0x10, r2, 0x0, 0x0, &(0x7f0000000300)=[0x1, r3, r4, r0, r0]}, 0x80) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x0, 0x0) 07:41:57 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 07:41:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000074000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xe000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x14, 0x81, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="85100000faffffff18310000030000000000000000000000000000e3c4fe45039acadbbd8cb4097bc520225c81a9526d382755a5e1e64402383e305454be16caf46439"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) close(r1) (async) close(r0) [ 2849.536746][T31826] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2849.544992][T31826] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2849.552801][T31826] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2849.560614][T31826] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2849.568426][T31826] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2849.576235][T31826] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2849.584051][T31826] 07:41:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x5, &(0x7f0000000100)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xcb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f00000015c0)='syzkaller\x00', 0x7, 0xb9, &(0x7f0000000040)=""/185, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000)={'vxcan1', 0x32, 0x32}, 0x9) 07:41:58 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x10000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000079000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2849.633054][T31876] FAULT_INJECTION: forcing a failure. [ 2849.633054][T31876] name failslab, interval 1, probability 0, space 0, times 0 [ 2849.656595][T31876] CPU: 1 PID: 31876 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2849.666670][T31876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2849.676560][T31876] Call Trace: [ 2849.679682][T31876] [ 2849.682461][T31876] dump_stack_lvl+0x151/0x1b7 [ 2849.686973][T31876] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2849.692268][T31876] dump_stack+0x15/0x17 [ 2849.696260][T31876] should_fail+0x3c0/0x510 [ 2849.700512][T31876] __should_failslab+0x9f/0xe0 [ 2849.705113][T31876] should_failslab+0x9/0x20 [ 2849.709454][T31876] kmem_cache_alloc+0x4f/0x2f0 [ 2849.714054][T31876] ? anon_vma_fork+0x1b9/0x4f0 [ 2849.718654][T31876] anon_vma_fork+0x1b9/0x4f0 [ 2849.723080][T31876] dup_mmap+0x750/0xea0 [ 2849.727070][T31876] ? __delayed_free_task+0x20/0x20 [ 2849.732020][T31876] ? mm_init+0x807/0x960 [ 2849.736101][T31876] dup_mm+0x91/0x330 [ 2849.739833][T31876] copy_mm+0x108/0x1b0 [ 2849.743734][T31876] copy_process+0x1295/0x3250 [ 2849.748249][T31876] ? proc_fail_nth_write+0x213/0x290 [ 2849.753375][T31876] ? proc_fail_nth_read+0x220/0x220 [ 2849.758404][T31876] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2849.763352][T31876] ? vfs_write+0x9af/0x1050 [ 2849.767688][T31876] ? vmacache_update+0xb7/0x120 [ 2849.772376][T31876] kernel_clone+0x22d/0x990 [ 2849.776715][T31876] ? file_end_write+0x1b0/0x1b0 [ 2849.781401][T31876] ? __kasan_check_write+0x14/0x20 [ 2849.786359][T31876] ? create_io_thread+0x1e0/0x1e0 [ 2849.791209][T31876] ? __mutex_lock_slowpath+0x10/0x10 [ 2849.796333][T31876] __x64_sys_clone+0x289/0x310 [ 2849.800930][T31876] ? __do_sys_vfork+0x130/0x130 [ 2849.805617][T31876] ? debug_smp_processor_id+0x17/0x20 [ 2849.810823][T31876] do_syscall_64+0x44/0xd0 [ 2849.815076][T31876] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2849.820805][T31876] RIP: 0033:0x7f4243ed90d9 [ 2849.825062][T31876] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2849.844503][T31876] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2849.852757][T31876] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2849.860555][T31876] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2849.868368][T31876] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2849.876180][T31876] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:41:58 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 37) 07:41:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x14, 0x81, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="85100000faffffff18310000030000000000000000000000000000e3c4fe45039acadbbd8cb4097bc520225c81a9526d382755a5e1e64402383e305454be16caf46439"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) close(r1) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x14, 0x81, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="85100000faffffff18310000030000000000000000000000000000e3c4fe45039acadbbd8cb4097bc520225c81a9526d382755a5e1e64402383e305454be16caf46439"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) close(r1) (async) close(r0) (async) 07:41:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x5, &(0x7f0000000100)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xcb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f00000015c0)='syzkaller\x00', 0x7, 0xb9, &(0x7f0000000040)=""/185, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000)={'vxcan1', 0x32, 0x32}, 0x9) 07:41:58 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x11000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000007a000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) 07:41:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x5, &(0x7f0000000100)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xcb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f00000015c0)='syzkaller\x00', 0x7, 0xb9, &(0x7f0000000040)=""/185, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000)={'vxcan1', 0x32, 0x32}, 0x9) 07:41:58 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x12000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000007b000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2849.883988][T31876] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2849.891804][T31876] [ 2849.916102][T31895] FAULT_INJECTION: forcing a failure. [ 2849.916102][T31895] name fail_page_alloc, interval 1, probability 0, space 0, times 0 07:41:58 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x18000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000ffffff85000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x20000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2849.931186][T31895] CPU: 1 PID: 31895 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2849.941254][T31895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2849.951146][T31895] Call Trace: [ 2849.954273][T31895] [ 2849.957052][T31895] dump_stack_lvl+0x151/0x1b7 [ 2849.961562][T31895] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2849.966860][T31895] ? stack_trace_save+0x1f0/0x1f0 [ 2849.971719][T31895] ? __kernel_text_address+0x9a/0x110 [ 2849.976926][T31895] dump_stack+0x15/0x17 [ 2849.980915][T31895] should_fail+0x3c0/0x510 [ 2849.985169][T31895] should_fail_alloc_page+0x58/0x70 [ 2849.990203][T31895] __alloc_pages+0x1de/0x7c0 [ 2849.994628][T31895] ? stack_trace_save+0x12d/0x1f0 [ 2849.999490][T31895] ? stack_trace_snprint+0x100/0x100 [ 2850.004610][T31895] ? __count_vm_events+0x30/0x30 [ 2850.009381][T31895] ? __kasan_slab_alloc+0xc4/0xe0 [ 2850.014238][T31895] ? __kasan_slab_alloc+0xb2/0xe0 [ 2850.019099][T31895] ? kmem_cache_alloc+0x189/0x2f0 [ 2850.023960][T31895] ? anon_vma_fork+0x1b9/0x4f0 [ 2850.028562][T31895] get_zeroed_page+0x19/0x40 [ 2850.032989][T31895] __pud_alloc+0x8b/0x260 [ 2850.037152][T31895] ? do_handle_mm_fault+0x2370/0x2370 [ 2850.042362][T31895] copy_page_range+0xd9e/0x1090 [ 2850.047050][T31895] ? pfn_valid+0x1e0/0x1e0 [ 2850.051302][T31895] dup_mmap+0x99f/0xea0 [ 2850.055294][T31895] ? __delayed_free_task+0x20/0x20 [ 2850.060239][T31895] ? mm_init+0x807/0x960 [ 2850.064319][T31895] dup_mm+0x91/0x330 [ 2850.068050][T31895] copy_mm+0x108/0x1b0 [ 2850.071958][T31895] copy_process+0x1295/0x3250 [ 2850.076468][T31895] ? proc_fail_nth_write+0x213/0x290 [ 2850.081589][T31895] ? proc_fail_nth_read+0x220/0x220 [ 2850.086624][T31895] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2850.091571][T31895] ? vfs_write+0x9af/0x1050 [ 2850.095911][T31895] ? vmacache_update+0xb7/0x120 [ 2850.100598][T31895] kernel_clone+0x22d/0x990 [ 2850.104938][T31895] ? file_end_write+0x1b0/0x1b0 [ 2850.109623][T31895] ? __kasan_check_write+0x14/0x20 [ 2850.114570][T31895] ? create_io_thread+0x1e0/0x1e0 [ 2850.119430][T31895] ? __mutex_lock_slowpath+0x10/0x10 [ 2850.124553][T31895] __x64_sys_clone+0x289/0x310 [ 2850.129160][T31895] ? __do_sys_vfork+0x130/0x130 [ 2850.133840][T31895] ? debug_smp_processor_id+0x17/0x20 [ 2850.139052][T31895] do_syscall_64+0x44/0xd0 [ 2850.143313][T31895] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2850.149029][T31895] RIP: 0033:0x7f4243ed90d9 [ 2850.153284][T31895] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2850.172722][T31895] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 07:41:58 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 38) 07:41:58 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x25000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r1) close(r0) 07:41:58 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000195000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 0: write$cgroup_type(0xffffffffffffffff, &(0x7f00000010c0), 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001100)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000001140), 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001080)={0xffffffffffffffff, &(0x7f0000000000)="5b62d8ddf423dee06c54826cdb6a744a479b17b5bc79defa323deee3a4f4c16b410edfa3e2bbb3694744c4086e173bda46d61b23696c4269e66f42ef10fff4edd0fec394118d6e77473489d318ed80c4383a4726f7b5fbd9a0138b5cf7cd9d4c1997fdb679952b2215f8be64902dd1c16e00a415c0bbd5bf8e0dd9234820", &(0x7f0000000080)=""/4096}, 0x20) 07:41:58 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) 07:41:58 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x40000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000198000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2850.180965][T31895] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2850.188776][T31895] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2850.196586][T31895] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2850.204401][T31895] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2850.212210][T31895] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2850.220024][T31895] 07:41:58 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) 07:41:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r1) (async) close(r0) 07:41:58 executing program 0: write$cgroup_type(0xffffffffffffffff, &(0x7f00000010c0), 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001100)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000001140), 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001080)={0xffffffffffffffff, &(0x7f0000000000)="5b62d8ddf423dee06c54826cdb6a744a479b17b5bc79defa323deee3a4f4c16b410edfa3e2bbb3694744c4086e173bda46d61b23696c4269e66f42ef10fff4edd0fec394118d6e77473489d318ed80c4383a4726f7b5fbd9a0138b5cf7cd9d4c1997fdb679952b2215f8be64902dd1c16e00a415c0bbd5bf8e0dd9234820", &(0x7f0000000080)=""/4096}, 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f00000010c0), 0x9) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000001100)='syz1\x00', 0x200002, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000001140), 0x2, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001080)={0xffffffffffffffff, &(0x7f0000000000)="5b62d8ddf423dee06c54826cdb6a744a479b17b5bc79defa323deee3a4f4c16b410edfa3e2bbb3694744c4086e173bda46d61b23696c4269e66f42ef10fff4edd0fec394118d6e77473489d318ed80c4383a4726f7b5fbd9a0138b5cf7cd9d4c1997fdb679952b2215f8be64902dd1c16e00a415c0bbd5bf8e0dd9234820", &(0x7f0000000080)=""/4096}, 0x20) (async) 07:41:58 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) [ 2850.267846][T31935] FAULT_INJECTION: forcing a failure. [ 2850.267846][T31935] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2850.294716][T31935] CPU: 0 PID: 31935 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2850.304791][T31935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2850.314689][T31935] Call Trace: [ 2850.317810][T31935] [ 2850.320590][T31935] dump_stack_lvl+0x151/0x1b7 [ 2850.325100][T31935] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2850.330392][T31935] ? __kasan_check_write+0x14/0x20 [ 2850.335338][T31935] ? __set_page_owner+0x2ee/0x310 [ 2850.340199][T31935] dump_stack+0x15/0x17 [ 2850.344194][T31935] should_fail+0x3c0/0x510 [ 2850.348443][T31935] should_fail_alloc_page+0x58/0x70 [ 2850.353475][T31935] __alloc_pages+0x1de/0x7c0 [ 2850.357902][T31935] ? __count_vm_events+0x30/0x30 [ 2850.362678][T31935] ? __count_vm_events+0x30/0x30 [ 2850.367450][T31935] ? __kasan_check_write+0x14/0x20 [ 2850.372396][T31935] ? _raw_spin_lock+0xa3/0x1b0 [ 2850.376996][T31935] __pmd_alloc+0xb1/0x550 [ 2850.381164][T31935] ? kmem_cache_alloc+0x189/0x2f0 [ 2850.386021][T31935] ? anon_vma_fork+0x1b9/0x4f0 [ 2850.390624][T31935] ? __pud_alloc+0x260/0x260 [ 2850.395048][T31935] ? __pud_alloc+0x218/0x260 [ 2850.399478][T31935] ? do_handle_mm_fault+0x2370/0x2370 [ 2850.404683][T31935] copy_page_range+0xd04/0x1090 [ 2850.409373][T31935] ? pfn_valid+0x1e0/0x1e0 [ 2850.413628][T31935] dup_mmap+0x99f/0xea0 [ 2850.417615][T31935] ? __delayed_free_task+0x20/0x20 [ 2850.422562][T31935] ? mm_init+0x807/0x960 [ 2850.426643][T31935] dup_mm+0x91/0x330 [ 2850.430376][T31935] copy_mm+0x108/0x1b0 [ 2850.434282][T31935] copy_process+0x1295/0x3250 [ 2850.438792][T31935] ? proc_fail_nth_write+0x213/0x290 [ 2850.443912][T31935] ? proc_fail_nth_read+0x220/0x220 [ 2850.448948][T31935] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2850.453893][T31935] ? vfs_write+0x9af/0x1050 [ 2850.458232][T31935] ? vmacache_update+0xb7/0x120 [ 2850.462920][T31935] kernel_clone+0x22d/0x990 [ 2850.467260][T31935] ? file_end_write+0x1b0/0x1b0 [ 2850.471945][T31935] ? __kasan_check_write+0x14/0x20 [ 2850.476895][T31935] ? create_io_thread+0x1e0/0x1e0 [ 2850.481755][T31935] ? __mutex_lock_slowpath+0x10/0x10 [ 2850.486876][T31935] __x64_sys_clone+0x289/0x310 [ 2850.491475][T31935] ? __do_sys_vfork+0x130/0x130 [ 2850.496166][T31935] ? debug_smp_processor_id+0x17/0x20 [ 2850.501369][T31935] do_syscall_64+0x44/0xd0 [ 2850.505621][T31935] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2850.511349][T31935] RIP: 0033:0x7f4243ed90d9 [ 2850.515602][T31935] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2850.535043][T31935] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2850.543293][T31935] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2850.551100][T31935] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2850.558910][T31935] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:41:58 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 39) 07:41:58 executing program 0: write$cgroup_type(0xffffffffffffffff, &(0x7f00000010c0), 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001100)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000001140), 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001080)={0xffffffffffffffff, &(0x7f0000000000)="5b62d8ddf423dee06c54826cdb6a744a479b17b5bc79defa323deee3a4f4c16b410edfa3e2bbb3694744c4086e173bda46d61b23696c4269e66f42ef10fff4edd0fec394118d6e77473489d318ed80c4383a4726f7b5fbd9a0138b5cf7cd9d4c1997fdb679952b2215f8be64902dd1c16e00a415c0bbd5bf8e0dd9234820", &(0x7f0000000080)=""/4096}, 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f00000010c0), 0x9) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x1c, 0x3, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x6, 0xad, &(0x7f0000001600)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000001100)='syz1\x00', 0x200002, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000001140), 0x2, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001080)={0xffffffffffffffff, &(0x7f0000000000)="5b62d8ddf423dee06c54826cdb6a744a479b17b5bc79defa323deee3a4f4c16b410edfa3e2bbb3694744c4086e173bda46d61b23696c4269e66f42ef10fff4edd0fec394118d6e77473489d318ed80c4383a4726f7b5fbd9a0138b5cf7cd9d4c1997fdb679952b2215f8be64902dd1c16e00a415c0bbd5bf8e0dd9234820", &(0x7f0000000080)=""/4096}, 0x20) (async) 07:41:58 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x48000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000ffffff9c000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) close(r1) (async, rerun: 32) close(r0) (rerun: 32) 07:41:58 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000ffffff9f000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:58 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x4c000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2850.566723][T31935] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2850.574532][T31935] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2850.582348][T31935] 07:41:58 executing program 3: syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:41:59 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000b0000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x64000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 0: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) 07:41:59 executing program 3: syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) [ 2850.628984][T31972] FAULT_INJECTION: forcing a failure. [ 2850.628984][T31972] name failslab, interval 1, probability 0, space 0, times 0 [ 2850.660899][T31972] CPU: 1 PID: 31972 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2850.670974][T31972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2850.680874][T31972] Call Trace: [ 2850.683993][T31972] [ 2850.686773][T31972] dump_stack_lvl+0x151/0x1b7 [ 2850.691287][T31972] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2850.696583][T31972] dump_stack+0x15/0x17 [ 2850.700572][T31972] should_fail+0x3c0/0x510 [ 2850.704823][T31972] __should_failslab+0x9f/0xe0 [ 2850.709432][T31972] should_failslab+0x9/0x20 [ 2850.713763][T31972] kmem_cache_alloc+0x4f/0x2f0 [ 2850.718366][T31972] ? anon_vma_clone+0xa1/0x4f0 [ 2850.722959][T31972] anon_vma_clone+0xa1/0x4f0 [ 2850.727385][T31972] anon_vma_fork+0x91/0x4f0 [ 2850.731726][T31972] ? anon_vma_name+0x4c/0x70 [ 2850.736157][T31972] dup_mmap+0x750/0xea0 [ 2850.740144][T31972] ? __delayed_free_task+0x20/0x20 [ 2850.745090][T31972] ? mm_init+0x807/0x960 [ 2850.749169][T31972] dup_mm+0x91/0x330 [ 2850.752905][T31972] copy_mm+0x108/0x1b0 [ 2850.756806][T31972] copy_process+0x1295/0x3250 [ 2850.761321][T31972] ? proc_fail_nth_write+0x213/0x290 [ 2850.766443][T31972] ? proc_fail_nth_read+0x220/0x220 [ 2850.771476][T31972] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2850.776420][T31972] ? vfs_write+0x9af/0x1050 [ 2850.780760][T31972] ? vmacache_update+0xb7/0x120 [ 2850.785448][T31972] kernel_clone+0x22d/0x990 [ 2850.789788][T31972] ? file_end_write+0x1b0/0x1b0 [ 2850.794478][T31972] ? __kasan_check_write+0x14/0x20 [ 2850.799421][T31972] ? create_io_thread+0x1e0/0x1e0 [ 2850.804283][T31972] ? __mutex_lock_slowpath+0x10/0x10 [ 2850.809406][T31972] __x64_sys_clone+0x289/0x310 [ 2850.814002][T31972] ? __do_sys_vfork+0x130/0x130 [ 2850.818689][T31972] ? debug_smp_processor_id+0x17/0x20 [ 2850.823896][T31972] do_syscall_64+0x44/0xd0 [ 2850.828150][T31972] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2850.833878][T31972] RIP: 0033:0x7f4243ed90d9 [ 2850.838133][T31972] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2850.857577][T31972] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2850.865818][T31972] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 07:41:59 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 40) 07:41:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x66010000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.stat\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x6, &(0x7f00000000c0)=@raw=[@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x1, 0xb, 0x6, 0xa, 0x4, 0x10}, @call={0x85, 0x0, 0x0, 0xb2}, @jmp={0x5, 0x1, 0x0, 0x3, 0x5, 0xffffffffffffffff, 0xffffffffffffffd0}, @generic={0x8, 0x1, 0xc, 0x0, 0x401}], &(0x7f0000000100)='GPL\x00', 0x7, 0xcb, &(0x7f0000000140)=""/203, 0x40f00, 0x1c, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000580)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0x2, 0x9}, 0x10, 0x2241, r5}, 0x80) close(r0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740), 0x1, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000780)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)={0x0, 0x3, [@multicast, @empty, @local]}) 07:41:59 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000001ac5c8000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 0: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 07:41:59 executing program 3: syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) 07:41:59 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000dd000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x68000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) (async) close(r1) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.stat\x00', 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x6, &(0x7f00000000c0)=@raw=[@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x1, 0xb, 0x6, 0xa, 0x4, 0x10}, @call={0x85, 0x0, 0x0, 0xb2}, @jmp={0x5, 0x1, 0x0, 0x3, 0x5, 0xffffffffffffffff, 0xffffffffffffffd0}, @generic={0x8, 0x1, 0xc, 0x0, 0x401}], &(0x7f0000000100)='GPL\x00', 0x7, 0xcb, &(0x7f0000000140)=""/203, 0x40f00, 0x1c, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000580)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0x2, 0x9}, 0x10, 0x2241, r5}, 0x80) (async) close(r0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740), 0x1, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000780)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)={0x0, 0x3, [@multicast, @empty, @local]}) [ 2850.873634][T31972] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2850.881439][T31972] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2850.889251][T31972] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2850.897060][T31972] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2850.904875][T31972] 07:41:59 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0xffffffffffffffff) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) 07:41:59 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000f0000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000003fb000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2850.956676][T31998] FAULT_INJECTION: forcing a failure. [ 2850.956676][T31998] name failslab, interval 1, probability 0, space 0, times 0 [ 2850.975277][T31998] CPU: 0 PID: 31998 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2850.985345][T31998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2850.995240][T31998] Call Trace: [ 2850.998362][T31998] [ 2851.001144][T31998] dump_stack_lvl+0x151/0x1b7 [ 2851.005656][T31998] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2851.010948][T31998] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2851.017194][T31998] dump_stack+0x15/0x17 [ 2851.021187][T31998] should_fail+0x3c0/0x510 [ 2851.025439][T31998] __should_failslab+0x9f/0xe0 [ 2851.030040][T31998] should_failslab+0x9/0x20 [ 2851.034380][T31998] kmem_cache_alloc+0x4f/0x2f0 [ 2851.038977][T31998] ? anon_vma_fork+0xf7/0x4f0 [ 2851.043493][T31998] anon_vma_fork+0xf7/0x4f0 [ 2851.047832][T31998] ? anon_vma_name+0x4c/0x70 [ 2851.052258][T31998] dup_mmap+0x750/0xea0 [ 2851.056251][T31998] ? __delayed_free_task+0x20/0x20 [ 2851.061198][T31998] ? mm_init+0x807/0x960 [ 2851.065276][T31998] dup_mm+0x91/0x330 [ 2851.069008][T31998] copy_mm+0x108/0x1b0 [ 2851.072914][T31998] copy_process+0x1295/0x3250 [ 2851.077427][T31998] ? proc_fail_nth_write+0x213/0x290 [ 2851.082546][T31998] ? proc_fail_nth_read+0x220/0x220 [ 2851.087581][T31998] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2851.092526][T31998] ? vfs_write+0x9af/0x1050 [ 2851.096866][T31998] ? vmacache_update+0xb7/0x120 [ 2851.101554][T31998] kernel_clone+0x22d/0x990 [ 2851.105894][T31998] ? file_end_write+0x1b0/0x1b0 [ 2851.110579][T31998] ? __kasan_check_write+0x14/0x20 [ 2851.115526][T31998] ? create_io_thread+0x1e0/0x1e0 [ 2851.120389][T31998] ? __mutex_lock_slowpath+0x10/0x10 [ 2851.125509][T31998] __x64_sys_clone+0x289/0x310 [ 2851.130108][T31998] ? __do_sys_vfork+0x130/0x130 [ 2851.134796][T31998] ? debug_smp_processor_id+0x17/0x20 [ 2851.140002][T31998] do_syscall_64+0x44/0xd0 [ 2851.144255][T31998] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2851.149982][T31998] RIP: 0033:0x7f4243ed90d9 [ 2851.154238][T31998] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2851.173678][T31998] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2851.181923][T31998] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2851.189733][T31998] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2851.197543][T31998] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:41:59 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 41) 07:41:59 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000ff000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.stat\x00', 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x6, &(0x7f00000000c0)=@raw=[@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x1, 0xb, 0x6, 0xa, 0x4, 0x10}, @call={0x85, 0x0, 0x0, 0xb2}, @jmp={0x5, 0x1, 0x0, 0x3, 0x5, 0xffffffffffffffff, 0xffffffffffffffd0}, @generic={0x8, 0x1, 0xc, 0x0, 0x401}], &(0x7f0000000100)='GPL\x00', 0x7, 0xcb, &(0x7f0000000140)=""/203, 0x40f00, 0x1c, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000580)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0x2, 0x9}, 0x10, 0x2241, r5}, 0x80) (async) close(r0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740), 0x1, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000780)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)={0x0, 0x3, [@multicast, @empty, @local]}) 07:41:59 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) 07:41:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x6c000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0xffffffffffffffff) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) 07:41:59 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000085ffffff000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x74000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400101, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'nr0\x00', 0x600}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x204200, 0x0) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f00000000c0)) [ 2851.205357][T31998] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2851.213173][T31998] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2851.220981][T31998] 07:41:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r0) (async, rerun: 64) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400101, 0x0) (rerun: 64) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'nr0\x00', 0x600}) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x204200, 0x0) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f00000000c0)) 07:41:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x7a000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:41:59 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000009cffffff000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2851.273975][T32027] FAULT_INJECTION: forcing a failure. [ 2851.273975][T32027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2851.309548][T32027] CPU: 1 PID: 32027 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2851.319629][T32027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2851.329525][T32027] Call Trace: [ 2851.332638][T32027] [ 2851.335419][T32027] dump_stack_lvl+0x151/0x1b7 [ 2851.339931][T32027] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2851.345227][T32027] dump_stack+0x15/0x17 [ 2851.349216][T32027] should_fail+0x3c0/0x510 [ 2851.353471][T32027] should_fail_alloc_page+0x58/0x70 [ 2851.358501][T32027] __alloc_pages+0x1de/0x7c0 [ 2851.362931][T32027] ? __count_vm_events+0x30/0x30 [ 2851.367701][T32027] ? __this_cpu_preempt_check+0x13/0x20 [ 2851.373083][T32027] ? __mod_node_page_state+0xac/0xf0 [ 2851.378204][T32027] pte_alloc_one+0x73/0x1b0 [ 2851.382544][T32027] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2851.387580][T32027] __pte_alloc+0x86/0x350 [ 2851.391743][T32027] ? free_pgtables+0x210/0x210 [ 2851.396343][T32027] ? _raw_spin_lock+0xa3/0x1b0 [ 2851.400945][T32027] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2851.406150][T32027] ? __kernel_text_address+0x9a/0x110 [ 2851.411360][T32027] copy_pte_range+0x1b1f/0x20b0 [ 2851.416051][T32027] ? __kunmap_atomic+0x80/0x80 [ 2851.420647][T32027] ? __kasan_slab_alloc+0xc4/0xe0 [ 2851.425508][T32027] ? __kasan_slab_alloc+0xb2/0xe0 [ 2851.430370][T32027] ? kmem_cache_alloc+0x189/0x2f0 [ 2851.435226][T32027] ? vm_area_dup+0x26/0x1d0 [ 2851.439566][T32027] ? dup_mmap+0x6b8/0xea0 [ 2851.443733][T32027] ? dup_mm+0x91/0x330 [ 2851.447640][T32027] ? copy_mm+0x108/0x1b0 [ 2851.451718][T32027] ? copy_process+0x1295/0x3250 [ 2851.456407][T32027] ? kernel_clone+0x22d/0x990 [ 2851.460915][T32027] ? __x64_sys_clone+0x289/0x310 [ 2851.465693][T32027] ? do_syscall_64+0x44/0xd0 [ 2851.470116][T32027] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2851.476025][T32027] copy_page_range+0xc1e/0x1090 [ 2851.480720][T32027] ? pfn_valid+0x1e0/0x1e0 [ 2851.484968][T32027] dup_mmap+0x99f/0xea0 [ 2851.488953][T32027] ? __delayed_free_task+0x20/0x20 [ 2851.493906][T32027] ? mm_init+0x807/0x960 [ 2851.497978][T32027] dup_mm+0x91/0x330 [ 2851.501708][T32027] copy_mm+0x108/0x1b0 [ 2851.505615][T32027] copy_process+0x1295/0x3250 [ 2851.510131][T32027] ? proc_fail_nth_write+0x213/0x290 [ 2851.515250][T32027] ? proc_fail_nth_read+0x220/0x220 [ 2851.520283][T32027] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2851.525230][T32027] ? vfs_write+0x9af/0x1050 [ 2851.529568][T32027] ? vmacache_update+0xb7/0x120 [ 2851.534259][T32027] kernel_clone+0x22d/0x990 [ 2851.538599][T32027] ? file_end_write+0x1b0/0x1b0 [ 2851.543283][T32027] ? __kasan_check_write+0x14/0x20 [ 2851.548231][T32027] ? create_io_thread+0x1e0/0x1e0 [ 2851.553089][T32027] ? __mutex_lock_slowpath+0x10/0x10 [ 2851.558210][T32027] __x64_sys_clone+0x289/0x310 [ 2851.562809][T32027] ? __do_sys_vfork+0x130/0x130 [ 2851.567498][T32027] ? debug_smp_processor_id+0x17/0x20 [ 2851.572705][T32027] do_syscall_64+0x44/0xd0 [ 2851.576957][T32027] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2851.582685][T32027] RIP: 0033:0x7f4243ed90d9 [ 2851.586941][T32027] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2851.606379][T32027] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2851.614627][T32027] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 07:42:00 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 42) 07:42:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r0) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400101, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'nr0\x00', 0x600}) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x204200, 0x0) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f00000000c0)) 07:42:00 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0xffffffffffffffff) (async) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) 07:42:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x80ffffff, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) 07:42:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000009fffffff000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x439}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x84}, 0x48) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x440000, 0x0) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000040)=0x20) close(r0) 07:42:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x85ffffff, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000001000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2851.622435][T32027] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2851.630245][T32027] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2851.638059][T32027] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2851.645871][T32027] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2851.653683][T32027] 07:42:00 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000020000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x90ffffff, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2851.696656][T32058] FAULT_INJECTION: forcing a failure. [ 2851.696656][T32058] name failslab, interval 1, probability 0, space 0, times 0 [ 2851.737298][T32058] CPU: 1 PID: 32058 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2851.747386][T32058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2851.757279][T32058] Call Trace: [ 2851.760402][T32058] [ 2851.763178][T32058] dump_stack_lvl+0x151/0x1b7 [ 2851.767690][T32058] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2851.772984][T32058] dump_stack+0x15/0x17 [ 2851.776974][T32058] should_fail+0x3c0/0x510 [ 2851.781271][T32058] __should_failslab+0x9f/0xe0 [ 2851.785828][T32058] should_failslab+0x9/0x20 [ 2851.790167][T32058] kmem_cache_alloc+0x4f/0x2f0 [ 2851.794765][T32058] ? vm_area_dup+0x26/0x1d0 [ 2851.799106][T32058] vm_area_dup+0x26/0x1d0 [ 2851.803271][T32058] dup_mmap+0x6b8/0xea0 [ 2851.807265][T32058] ? __delayed_free_task+0x20/0x20 [ 2851.812210][T32058] ? mm_init+0x807/0x960 [ 2851.816291][T32058] dup_mm+0x91/0x330 [ 2851.820021][T32058] copy_mm+0x108/0x1b0 [ 2851.823926][T32058] copy_process+0x1295/0x3250 [ 2851.828443][T32058] ? proc_fail_nth_write+0x213/0x290 [ 2851.833647][T32058] ? proc_fail_nth_read+0x220/0x220 [ 2851.838682][T32058] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2851.843628][T32058] ? vfs_write+0x9af/0x1050 [ 2851.847969][T32058] ? vmacache_update+0xb7/0x120 [ 2851.852669][T32058] kernel_clone+0x22d/0x990 [ 2851.856997][T32058] ? file_end_write+0x1b0/0x1b0 [ 2851.861682][T32058] ? __kasan_check_write+0x14/0x20 [ 2851.866630][T32058] ? create_io_thread+0x1e0/0x1e0 [ 2851.871490][T32058] ? __mutex_lock_slowpath+0x10/0x10 [ 2851.876610][T32058] __x64_sys_clone+0x289/0x310 [ 2851.881211][T32058] ? __do_sys_vfork+0x130/0x130 [ 2851.885896][T32058] ? debug_smp_processor_id+0x17/0x20 [ 2851.891111][T32058] do_syscall_64+0x44/0xd0 [ 2851.895356][T32058] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2851.901084][T32058] RIP: 0033:0x7f4243ed90d9 [ 2851.905340][T32058] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2851.924779][T32058] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 07:42:00 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 43) 07:42:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x439}, 0x8) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x84}, 0x48) close(r2) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x440000, 0x0) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000040)=0x20) close(r0) 07:42:00 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) 07:42:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000010000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x95010000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) [ 2851.933022][T32058] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2851.940834][T32058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2851.948645][T32058] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2851.956457][T32058] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2851.964267][T32058] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2851.972082][T32058] 07:42:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x439}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x84}, 0x48) (async) close(r2) (async, rerun: 32) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x440000, 0x0) (rerun: 32) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000040)=0x20) (async, rerun: 64) close(r0) (rerun: 64) [ 2851.985605][T32072] FAULT_INJECTION: forcing a failure. [ 2851.985605][T32072] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2852.004911][T32072] CPU: 1 PID: 32072 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2852.014985][T32072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2852.024874][T32072] Call Trace: [ 2852.027998][T32072] [ 2852.030771][T32072] dump_stack_lvl+0x151/0x1b7 [ 2852.035291][T32072] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2852.040581][T32072] ? __kasan_check_write+0x14/0x20 [ 2852.045528][T32072] ? __set_page_owner+0x2ee/0x310 [ 2852.050390][T32072] dump_stack+0x15/0x17 [ 2852.054382][T32072] should_fail+0x3c0/0x510 [ 2852.058634][T32072] should_fail_alloc_page+0x58/0x70 [ 2852.063668][T32072] __alloc_pages+0x1de/0x7c0 [ 2852.068096][T32072] ? __count_vm_events+0x30/0x30 [ 2852.072864][T32072] ? __count_vm_events+0x30/0x30 [ 2852.077640][T32072] ? __kasan_check_write+0x14/0x20 [ 2852.082586][T32072] ? _raw_spin_lock+0xa3/0x1b0 07:42:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x98010000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000001010000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x99020000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000020000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 0: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0xffffffffffffffff) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) [ 2852.087187][T32072] __pmd_alloc+0xb1/0x550 [ 2852.091355][T32072] ? kmem_cache_alloc+0x189/0x2f0 [ 2852.096213][T32072] ? anon_vma_fork+0x1b9/0x4f0 [ 2852.100814][T32072] ? __pud_alloc+0x260/0x260 [ 2852.105250][T32072] ? __pud_alloc+0x218/0x260 [ 2852.109666][T32072] ? do_handle_mm_fault+0x2370/0x2370 [ 2852.114871][T32072] copy_page_range+0xd04/0x1090 [ 2852.119559][T32072] ? pfn_valid+0x1e0/0x1e0 [ 2852.123809][T32072] dup_mmap+0x99f/0xea0 [ 2852.127801][T32072] ? __delayed_free_task+0x20/0x20 [ 2852.132748][T32072] ? mm_init+0x807/0x960 [ 2852.136826][T32072] dup_mm+0x91/0x330 [ 2852.140558][T32072] copy_mm+0x108/0x1b0 [ 2852.144464][T32072] copy_process+0x1295/0x3250 [ 2852.148978][T32072] ? proc_fail_nth_write+0x213/0x290 [ 2852.154099][T32072] ? proc_fail_nth_read+0x220/0x220 [ 2852.159140][T32072] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2852.164080][T32072] ? vfs_write+0x9af/0x1050 [ 2852.168419][T32072] ? vmacache_update+0xb7/0x120 [ 2852.173108][T32072] kernel_clone+0x22d/0x990 [ 2852.177447][T32072] ? file_end_write+0x1b0/0x1b0 [ 2852.182131][T32072] ? __kasan_check_write+0x14/0x20 [ 2852.187081][T32072] ? create_io_thread+0x1e0/0x1e0 [ 2852.191940][T32072] ? __mutex_lock_slowpath+0x10/0x10 [ 2852.197064][T32072] __x64_sys_clone+0x289/0x310 [ 2852.201660][T32072] ? __do_sys_vfork+0x130/0x130 [ 2852.206349][T32072] ? debug_smp_processor_id+0x17/0x20 [ 2852.211553][T32072] do_syscall_64+0x44/0xd0 [ 2852.215816][T32072] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2852.221533][T32072] RIP: 0033:0x7f4243ed90d9 [ 2852.225795][T32072] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2852.245230][T32072] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2852.253473][T32072] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2852.261284][T32072] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2852.269099][T32072] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2852.276908][T32072] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:42:00 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 44) 07:42:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xb0000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000030000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="85100000faffffff183e000003000000000000000000000095000000000000009500000000000000c0c7b6ff19f2e255db907ebf526c8966f4197d7453dc2a7937123573f143c7185206cdfc52b34a6fb24cc41d389b7d5605ca7618cf827745785c2124a6f7ac9c9f3a30b62b862cb900e38f07f2c14bb72bd2f79a2c971b30931529a63faa55073d2b8226da028419a2b5d8ccc1aa417d5c"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) close(r3) 07:42:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xc8c51a00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2852.284717][T32072] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2852.292535][T32072] [ 2852.309168][T32107] FAULT_INJECTION: forcing a failure. [ 2852.309168][T32107] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2852.336771][T32107] CPU: 1 PID: 32107 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2852.346845][T32107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2852.356734][T32107] Call Trace: [ 2852.359856][T32107] [ 2852.362633][T32107] dump_stack_lvl+0x151/0x1b7 [ 2852.367145][T32107] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2852.372443][T32107] dump_stack+0x15/0x17 [ 2852.376439][T32107] should_fail+0x3c0/0x510 [ 2852.380684][T32107] should_fail_alloc_page+0x58/0x70 [ 2852.385718][T32107] __alloc_pages+0x1de/0x7c0 [ 2852.390146][T32107] ? __count_vm_events+0x30/0x30 [ 2852.394918][T32107] ? dup_mm+0x91/0x330 [ 2852.398835][T32107] ? copy_mm+0x108/0x1b0 [ 2852.402902][T32107] ? copy_process+0x1295/0x3250 [ 2852.407589][T32107] ? kernel_clone+0x22d/0x990 [ 2852.412105][T32107] ? __x64_sys_clone+0x289/0x310 [ 2852.416877][T32107] pte_alloc_one+0x73/0x1b0 [ 2852.421215][T32107] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2852.426252][T32107] ? __kasan_check_write+0x14/0x20 [ 2852.431196][T32107] ? __set_page_owner+0x2ee/0x310 [ 2852.436059][T32107] __pte_alloc+0x86/0x350 [ 2852.440224][T32107] ? post_alloc_hook+0x1ab/0x1b0 [ 2852.444999][T32107] ? free_pgtables+0x210/0x210 [ 2852.449598][T32107] ? get_page_from_freelist+0x38b/0x400 [ 2852.454978][T32107] copy_pte_range+0x1b1f/0x20b0 [ 2852.459669][T32107] ? __kunmap_atomic+0x80/0x80 [ 2852.464266][T32107] ? __pud_alloc+0x260/0x260 [ 2852.468691][T32107] ? __pud_alloc+0x218/0x260 [ 2852.473121][T32107] ? do_handle_mm_fault+0x2370/0x2370 [ 2852.478326][T32107] copy_page_range+0xc1e/0x1090 [ 2852.483012][T32107] ? pfn_valid+0x1e0/0x1e0 [ 2852.487266][T32107] dup_mmap+0x99f/0xea0 [ 2852.491271][T32107] ? __delayed_free_task+0x20/0x20 [ 2852.496205][T32107] ? mm_init+0x807/0x960 [ 2852.500284][T32107] dup_mm+0x91/0x330 [ 2852.504016][T32107] copy_mm+0x108/0x1b0 [ 2852.507921][T32107] copy_process+0x1295/0x3250 [ 2852.512438][T32107] ? proc_fail_nth_write+0x213/0x290 [ 2852.517554][T32107] ? proc_fail_nth_read+0x220/0x220 [ 2852.522590][T32107] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2852.527798][T32107] ? vfs_write+0x9af/0x1050 [ 2852.532138][T32107] ? vmacache_update+0xb7/0x120 [ 2852.536825][T32107] kernel_clone+0x22d/0x990 [ 2852.541168][T32107] ? file_end_write+0x1b0/0x1b0 [ 2852.545849][T32107] ? __kasan_check_write+0x14/0x20 [ 2852.550795][T32107] ? create_io_thread+0x1e0/0x1e0 [ 2852.555657][T32107] ? __mutex_lock_slowpath+0x10/0x10 [ 2852.560777][T32107] __x64_sys_clone+0x289/0x310 [ 2852.565378][T32107] ? __do_sys_vfork+0x130/0x130 [ 2852.570064][T32107] ? debug_smp_processor_id+0x17/0x20 [ 2852.575277][T32107] do_syscall_64+0x44/0xd0 [ 2852.579524][T32107] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2852.585262][T32107] RIP: 0033:0x7f4243ed90d9 [ 2852.589504][T32107] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2852.609124][T32107] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2852.617366][T32107] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2852.625177][T32107] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2852.632987][T32107] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:42:01 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) 07:42:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000040000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="85100000faffffff183e000003000000000000000000000095000000000000009500000000000000c0c7b6ff19f2e255db907ebf526c8966f4197d7453dc2a7937123573f143c7185206cdfc52b34a6fb24cc41d389b7d5605ca7618cf827745785c2124a6f7ac9c9f3a30b62b862cb900e38f07f2c14bb72bd2f79a2c971b30931529a63faa55073d2b8226da028419a2b5d8ccc1aa417d5c"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="85100000faffffff183e000003000000000000000000000095000000000000009500000000000000c0c7b6ff19f2e255db907ebf526c8966f4197d7453dc2a7937123573f143c7185206cdfc52b34a6fb24cc41d389b7d5605ca7618cf827745785c2124a6f7ac9c9f3a30b62b862cb900e38f07f2c14bb72bd2f79a2c971b30931529a63faa55073d2b8226da028419a2b5d8ccc1aa417d5c"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) (async) close(r3) (async) 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xdd000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000690000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000050000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1d3b00000100000074890001080000001800000004e630000000000000004aab4c84bf00001800000085200016c5b5a569c211afa6d7cd45afe50e451708a94268ae9350718b6a5074ee5286b03cf9acd286ffd35c2e33582e2fedfd0d43323c8a277e29fdff61dd227fec6c9c797db61510463e592473bdfcd114e86c3ab15cc75fdbb7a9b9630ea3b0f5bbbd01000080066fe9115a421bf9951b334a1641271914cd3fd2777ee2e396ca62a49f86ee0729fbd8e4413fb75c846d4108af483bf95fcd89e2d6d6893b2a60f63a"], &(0x7f0000000040)='GPL\x00', 0x7, 0xe4, &(0x7f0000000080)=""/228, 0x40f00, 0x17, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xa, 0x2, 0x6}, 0x10, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@cgroup=r2, r3, 0x4}, 0x10) 07:42:01 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 45) 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xf0000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000001050000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2852.640797][T32107] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2852.648610][T32107] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2852.656422][T32107] 07:42:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="85100000faffffff183e000003000000000000000000000095000000000000009500000000000000c0c7b6ff19f2e255db907ebf526c8966f4197d7453dc2a7937123573f143c7185206cdfc52b34a6fb24cc41d389b7d5605ca7618cf827745785c2124a6f7ac9c9f3a30b62b862cb900e38f07f2c14bb72bd2f79a2c971b30931529a63faa55073d2b8226da028419a2b5d8ccc1aa417d5c"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) close(r3) 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xfb030000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid_for_children\x00') 07:42:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) (fail_nth: 1) 07:42:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000060000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xff000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2852.719743][T32143] FAULT_INJECTION: forcing a failure. [ 2852.719743][T32143] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2852.747816][T32149] FAULT_INJECTION: forcing a failure. [ 2852.747816][T32149] name fail_usercopy, interval 1, probability 0, space 0, times 0 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xffffff80, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2852.753157][T32143] CPU: 0 PID: 32143 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2852.770733][T32143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2852.780628][T32143] Call Trace: [ 2852.783750][T32143] [ 2852.786528][T32143] dump_stack_lvl+0x151/0x1b7 [ 2852.791042][T32143] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2852.796336][T32143] dump_stack+0x15/0x17 [ 2852.800328][T32143] should_fail+0x3c0/0x510 [ 2852.804581][T32143] should_fail_alloc_page+0x58/0x70 [ 2852.809612][T32143] __alloc_pages+0x1de/0x7c0 [ 2852.814045][T32143] ? __count_vm_events+0x30/0x30 [ 2852.818814][T32143] ? __this_cpu_preempt_check+0x13/0x20 [ 2852.824197][T32143] ? __mod_node_page_state+0xac/0xf0 [ 2852.829320][T32143] pte_alloc_one+0x73/0x1b0 [ 2852.833657][T32143] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2852.838691][T32143] __pte_alloc+0x86/0x350 [ 2852.842860][T32143] ? free_pgtables+0x210/0x210 [ 2852.847454][T32143] ? _raw_spin_lock+0xa3/0x1b0 [ 2852.852059][T32143] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2852.857264][T32143] ? __kernel_text_address+0x9a/0x110 [ 2852.862470][T32143] copy_pte_range+0x1b1f/0x20b0 [ 2852.867164][T32143] ? __kunmap_atomic+0x80/0x80 [ 2852.871755][T32143] ? __kasan_slab_alloc+0xc4/0xe0 [ 2852.876616][T32143] ? __kasan_slab_alloc+0xb2/0xe0 [ 2852.881476][T32143] ? kmem_cache_alloc+0x189/0x2f0 [ 2852.886337][T32143] ? vm_area_dup+0x26/0x1d0 [ 2852.890676][T32143] ? dup_mmap+0x6b8/0xea0 [ 2852.894841][T32143] ? dup_mm+0x91/0x330 [ 2852.898747][T32143] ? copy_mm+0x108/0x1b0 [ 2852.902825][T32143] ? copy_process+0x1295/0x3250 [ 2852.907513][T32143] ? kernel_clone+0x22d/0x990 [ 2852.912024][T32143] ? __x64_sys_clone+0x289/0x310 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xffffff85, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2852.916801][T32143] ? do_syscall_64+0x44/0xd0 [ 2852.921226][T32143] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2852.927133][T32143] copy_page_range+0xc1e/0x1090 [ 2852.931822][T32143] ? pfn_valid+0x1e0/0x1e0 [ 2852.936070][T32143] dup_mmap+0x99f/0xea0 [ 2852.940062][T32143] ? __delayed_free_task+0x20/0x20 [ 2852.945025][T32143] ? mm_init+0x807/0x960 [ 2852.949090][T32143] dup_mm+0x91/0x330 [ 2852.952821][T32143] copy_mm+0x108/0x1b0 [ 2852.956724][T32143] copy_process+0x1295/0x3250 [ 2852.961238][T32143] ? proc_fail_nth_write+0x213/0x290 [ 2852.966361][T32143] ? proc_fail_nth_read+0x220/0x220 [ 2852.971395][T32143] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2852.976340][T32143] ? vfs_write+0x9af/0x1050 [ 2852.980681][T32143] ? vmacache_update+0xb7/0x120 [ 2852.985370][T32143] kernel_clone+0x22d/0x990 [ 2852.989706][T32143] ? file_end_write+0x1b0/0x1b0 [ 2852.994391][T32143] ? __kasan_check_write+0x14/0x20 [ 2852.999341][T32143] ? create_io_thread+0x1e0/0x1e0 [ 2853.004199][T32143] ? __mutex_lock_slowpath+0x10/0x10 [ 2853.009319][T32143] __x64_sys_clone+0x289/0x310 [ 2853.013924][T32143] ? __do_sys_vfork+0x130/0x130 [ 2853.018610][T32143] ? debug_smp_processor_id+0x17/0x20 [ 2853.023814][T32143] do_syscall_64+0x44/0xd0 [ 2853.028069][T32143] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2853.033800][T32143] RIP: 0033:0x7f4243ed90d9 [ 2853.038052][T32143] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2853.057492][T32143] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2853.065735][T32143] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2853.073545][T32143] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2853.081357][T32143] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2853.089166][T32143] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2853.096979][T32143] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2853.104795][T32143] [ 2853.107654][T32149] CPU: 1 PID: 32149 Comm: syz-executor.0 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2853.117725][T32149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2853.127616][T32149] Call Trace: [ 2853.130738][T32149] [ 2853.133517][T32149] dump_stack_lvl+0x151/0x1b7 [ 2853.138031][T32149] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2853.143324][T32149] dump_stack+0x15/0x17 [ 2853.147316][T32149] should_fail+0x3c0/0x510 [ 2853.151572][T32149] should_fail_usercopy+0x1a/0x20 [ 2853.156428][T32149] _copy_to_user+0x20/0x90 [ 2853.160683][T32149] simple_read_from_buffer+0xdd/0x160 [ 2853.165894][T32149] proc_fail_nth_read+0x1af/0x220 [ 2853.170750][T32149] ? proc_fault_inject_write+0x3a0/0x3a0 [ 2853.176220][T32149] ? security_file_permission+0x497/0x5f0 [ 2853.181771][T32149] ? proc_fault_inject_write+0x3a0/0x3a0 [ 2853.187242][T32149] vfs_read+0x299/0xd80 [ 2853.191234][T32149] ? kernel_read+0x1f0/0x1f0 [ 2853.195658][T32149] ? __kasan_check_write+0x14/0x20 [ 2853.200605][T32149] ? mutex_lock+0xb6/0x130 [ 2853.204861][T32149] ? wait_for_completion_killable_timeout+0x10/0x10 [ 2853.211282][T32149] ? __fdget_pos+0x26d/0x310 [ 2853.215707][T32149] ? ksys_read+0x77/0x2c0 [ 2853.219873][T32149] ksys_read+0x198/0x2c0 [ 2853.223955][T32149] ? vfs_write+0x1050/0x1050 [ 2853.228380][T32149] ? debug_smp_processor_id+0x17/0x20 [ 2853.233586][T32149] __x64_sys_read+0x7b/0x90 [ 2853.237927][T32149] do_syscall_64+0x44/0xd0 [ 2853.242183][T32149] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2853.247908][T32149] RIP: 0033:0x7f10764a4efc [ 2853.252167][T32149] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 07:42:01 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 46) 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0xffffff90, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) close(r1) (async) close(r0) (async) 07:42:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000070000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) (async) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid_for_children\x00') 07:42:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) [ 2853.271601][T32149] RSP: 002b:00007f1075266160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2853.279845][T32149] RAX: ffffffffffffffda RBX: 00007f1076612f80 RCX: 00007f10764a4efc [ 2853.287658][T32149] RDX: 000000000000000f RSI: 00007f10752661e0 RDI: 0000000000000004 [ 2853.295469][T32149] RBP: 00007f10752661d0 R08: 0000000000000000 R09: 0000000000000000 [ 2853.303279][T32149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2853.311093][T32149] R13: 00007ffc986069bf R14: 00007f1075266300 R15: 0000000000022000 [ 2853.318906][T32149] 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000080000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2853.350608][T32174] FAULT_INJECTION: forcing a failure. [ 2853.350608][T32174] name failslab, interval 1, probability 0, space 0, times 0 [ 2853.363843][T32174] CPU: 0 PID: 32174 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2853.373904][T32174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2853.383800][T32174] Call Trace: [ 2853.386924][T32174] [ 2853.389702][T32174] dump_stack_lvl+0x151/0x1b7 [ 2853.394216][T32174] ? bfq_pos_tree_add_move+0x43e/0x43e 07:42:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000090000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0xf0800, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0xe2, 0xff, 0x1, 0x4, 0x0, 0x4800000000, 0x60001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x200, 0x2, @perf_config_ext={0x4a0e, 0x96}, 0x2440, 0xffffffffffff35a1, 0x6, 0x5, 0x8, 0x40005, 0x1, 0x0, 0xa, 0x0, 0x104}, 0xffffffffffffffff, 0x12, 0xffffffffffffffff, 0xc) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x80, 0xc2, 0x3, 0x40, 0x9, 0x0, 0x5, 0x80000, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0xaae0, 0x401, 0x7, 0x4, 0x100000000, 0x4, 0x0, 0x0, 0x10001, 0x0, 0xfffffffffffffffc}, r1, 0x5, r2, 0x8) write$cgroup_pressure(r0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f0000000040)) [ 2853.399512][T32174] dump_stack+0x15/0x17 [ 2853.403499][T32174] should_fail+0x3c0/0x510 [ 2853.407755][T32174] __should_failslab+0x9f/0xe0 [ 2853.412353][T32174] should_failslab+0x9/0x20 [ 2853.416692][T32174] kmem_cache_alloc+0x4f/0x2f0 [ 2853.421293][T32174] ? vm_area_dup+0x26/0x1d0 [ 2853.425633][T32174] vm_area_dup+0x26/0x1d0 [ 2853.429800][T32174] dup_mmap+0x6b8/0xea0 [ 2853.433794][T32174] ? __delayed_free_task+0x20/0x20 [ 2853.438741][T32174] ? mm_init+0x807/0x960 [ 2853.442818][T32174] dup_mm+0x91/0x330 [ 2853.446552][T32174] copy_mm+0x108/0x1b0 [ 2853.450457][T32174] copy_process+0x1295/0x3250 [ 2853.454970][T32174] ? proc_fail_nth_write+0x213/0x290 [ 2853.460091][T32174] ? proc_fail_nth_read+0x220/0x220 [ 2853.465125][T32174] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2853.470069][T32174] ? vfs_write+0x9af/0x1050 [ 2853.474408][T32174] ? vmacache_update+0xb7/0x120 [ 2853.479099][T32174] kernel_clone+0x22d/0x990 [ 2853.483437][T32174] ? file_end_write+0x1b0/0x1b0 [ 2853.488120][T32174] ? __kasan_check_write+0x14/0x20 [ 2853.493069][T32174] ? create_io_thread+0x1e0/0x1e0 [ 2853.497927][T32174] ? __mutex_lock_slowpath+0x10/0x10 [ 2853.503045][T32174] __x64_sys_clone+0x289/0x310 [ 2853.507646][T32174] ? __do_sys_vfork+0x130/0x130 [ 2853.512334][T32174] ? debug_smp_processor_id+0x17/0x20 [ 2853.517541][T32174] do_syscall_64+0x44/0xd0 [ 2853.521792][T32174] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2853.527781][T32174] RIP: 0033:0x7f4243ed90d9 [ 2853.532035][T32174] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:42:01 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 47) 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) (async) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid_for_children\x00') 07:42:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) 07:42:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0xf0800, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0xe2, 0xff, 0x1, 0x4, 0x0, 0x4800000000, 0x60001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x200, 0x2, @perf_config_ext={0x4a0e, 0x96}, 0x2440, 0xffffffffffff35a1, 0x6, 0x5, 0x8, 0x40005, 0x1, 0x0, 0xa, 0x0, 0x104}, 0xffffffffffffffff, 0x12, 0xffffffffffffffff, 0xc) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x80, 0xc2, 0x3, 0x40, 0x9, 0x0, 0x5, 0x80000, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0xaae0, 0x401, 0x7, 0x4, 0x100000000, 0x4, 0x0, 0x0, 0x10001, 0x0, 0xfffffffffffffffc}, r1, 0x5, r2, 0x8) write$cgroup_pressure(r0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f0000000040)) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0xf0800, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0xe2, 0xff, 0x1, 0x4, 0x0, 0x4800000000, 0x60001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x200, 0x2, @perf_config_ext={0x4a0e, 0x96}, 0x2440, 0xffffffffffff35a1, 0x6, 0x5, 0x8, 0x40005, 0x1, 0x0, 0xa, 0x0, 0x104}, 0xffffffffffffffff, 0x12, 0xffffffffffffffff, 0xc) (async) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x80, 0xc2, 0x3, 0x40, 0x9, 0x0, 0x5, 0x80000, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0xaae0, 0x401, 0x7, 0x4, 0x100000000, 0x4, 0x0, 0x0, 0x10001, 0x0, 0xfffffffffffffffc}, r1, 0x5, r2, 0x8) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f0000000040)) (async) 07:42:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000a0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:01 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2853.551474][T32174] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2853.559721][T32174] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2853.567529][T32174] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2853.575343][T32174] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2853.583155][T32174] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2853.590964][T32174] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2853.598779][T32174] 07:42:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000b0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6120efcf01007700"], 0x8) close(r1) close(r0) 07:42:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6120efcf01007700"], 0x8) close(r1) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6120efcf01007700"], 0x8) (async) close(r1) (async) close(r0) (async) 07:42:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x9, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2853.623086][T32206] FAULT_INJECTION: forcing a failure. [ 2853.623086][T32206] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2853.640628][T32206] CPU: 0 PID: 32206 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2853.650689][T32206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2853.660584][T32206] Call Trace: [ 2853.663709][T32206] [ 2853.666483][T32206] dump_stack_lvl+0x151/0x1b7 [ 2853.671001][T32206] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2853.676296][T32206] ? __switch_to+0x617/0x1170 [ 2853.680809][T32206] ? native_set_ldt+0x360/0x360 [ 2853.685491][T32206] dump_stack+0x15/0x17 [ 2853.689484][T32206] should_fail+0x3c0/0x510 [ 2853.693737][T32206] should_fail_alloc_page+0x58/0x70 [ 2853.698769][T32206] __alloc_pages+0x1de/0x7c0 [ 2853.703198][T32206] ? __count_vm_events+0x30/0x30 [ 2853.707970][T32206] ? __this_cpu_preempt_check+0x13/0x20 [ 2853.713355][T32206] pte_alloc_one+0x73/0x1b0 [ 2853.717693][T32206] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2853.722722][T32206] __pte_alloc+0x86/0x350 [ 2853.726888][T32206] ? free_pgtables+0x210/0x210 [ 2853.731488][T32206] ? _raw_spin_lock+0xa3/0x1b0 [ 2853.736089][T32206] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2853.741296][T32206] ? __kernel_text_address+0x9a/0x110 [ 2853.746502][T32206] copy_pte_range+0x1b1f/0x20b0 [ 2853.751190][T32206] ? __kunmap_atomic+0x80/0x80 [ 2853.755787][T32206] ? __kasan_slab_alloc+0xc4/0xe0 [ 2853.760750][T32206] ? __kasan_slab_alloc+0xb2/0xe0 [ 2853.765606][T32206] ? kmem_cache_alloc+0x189/0x2f0 [ 2853.770470][T32206] ? vm_area_dup+0x26/0x1d0 [ 2853.774806][T32206] ? dup_mmap+0x6b8/0xea0 [ 2853.778973][T32206] ? dup_mm+0x91/0x330 [ 2853.782880][T32206] ? copy_mm+0x108/0x1b0 [ 2853.786959][T32206] ? copy_process+0x1295/0x3250 [ 2853.791646][T32206] ? kernel_clone+0x22d/0x990 [ 2853.796157][T32206] ? __x64_sys_clone+0x289/0x310 [ 2853.800931][T32206] ? do_syscall_64+0x44/0xd0 [ 2853.805356][T32206] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2853.811268][T32206] copy_page_range+0xc1e/0x1090 [ 2853.815947][T32206] ? pfn_valid+0x1e0/0x1e0 [ 2853.820198][T32206] dup_mmap+0x99f/0xea0 [ 2853.824191][T32206] ? __delayed_free_task+0x20/0x20 [ 2853.829140][T32206] ? mm_init+0x807/0x960 [ 2853.833219][T32206] dup_mm+0x91/0x330 [ 2853.836950][T32206] copy_mm+0x108/0x1b0 [ 2853.840859][T32206] copy_process+0x1295/0x3250 [ 2853.845371][T32206] ? proc_fail_nth_write+0x213/0x290 [ 2853.850490][T32206] ? proc_fail_nth_read+0x220/0x220 [ 2853.855522][T32206] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2853.860469][T32206] ? vfs_write+0x9af/0x1050 [ 2853.864817][T32206] ? vmacache_update+0xb7/0x120 [ 2853.869502][T32206] kernel_clone+0x22d/0x990 [ 2853.873838][T32206] ? file_end_write+0x1b0/0x1b0 [ 2853.878520][T32206] ? __kasan_check_write+0x14/0x20 [ 2853.883468][T32206] ? create_io_thread+0x1e0/0x1e0 [ 2853.888332][T32206] ? __mutex_lock_slowpath+0x10/0x10 [ 2853.893458][T32206] __x64_sys_clone+0x289/0x310 [ 2853.898053][T32206] ? __do_sys_vfork+0x130/0x130 [ 2853.902737][T32206] ? debug_smp_processor_id+0x17/0x20 [ 2853.907945][T32206] do_syscall_64+0x44/0xd0 [ 2853.912197][T32206] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2853.917926][T32206] RIP: 0033:0x7f4243ed90d9 [ 2853.922179][T32206] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2853.941618][T32206] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2853.949866][T32206] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2853.957673][T32206] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2853.965486][T32206] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:42:02 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 48) 07:42:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0xa, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6120efcf01007700"], 0x8) close(r1) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6120efcf01007700"], 0x8) (async) close(r1) (async) close(r0) (async) 07:42:02 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) 07:42:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0xf0800, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0xe2, 0xff, 0x1, 0x4, 0x0, 0x4800000000, 0x60001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x200, 0x2, @perf_config_ext={0x4a0e, 0x96}, 0x2440, 0xffffffffffff35a1, 0x6, 0x5, 0x8, 0x40005, 0x1, 0x0, 0xa, 0x0, 0x104}, 0xffffffffffffffff, 0x12, 0xffffffffffffffff, 0xc) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x80, 0xc2, 0x3, 0x40, 0x9, 0x0, 0x5, 0x80000, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0xaae0, 0x401, 0x7, 0x4, 0x100000000, 0x4, 0x0, 0x0, 0x10001, 0x0, 0xfffffffffffffffc}, r1, 0x5, r2, 0x8) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f0000000040)) 07:42:02 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000c0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'wlan0\x00', @multicast}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) close(r0) 07:42:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0xb, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000d0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2853.973297][T32206] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2853.981113][T32206] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2853.988924][T32206] [ 2854.011611][T32248] FAULT_INJECTION: forcing a failure. [ 2854.011611][T32248] name failslab, interval 1, probability 0, space 0, times 0 07:42:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1\x00', 0x400}) 07:42:02 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) (async) 07:42:02 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000e0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2854.035531][T32248] CPU: 1 PID: 32248 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2854.045607][T32248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2854.055501][T32248] Call Trace: [ 2854.058625][T32248] [ 2854.061402][T32248] dump_stack_lvl+0x151/0x1b7 [ 2854.065916][T32248] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2854.071210][T32248] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2854.077459][T32248] dump_stack+0x15/0x17 [ 2854.081452][T32248] should_fail+0x3c0/0x510 [ 2854.085702][T32248] __should_failslab+0x9f/0xe0 [ 2854.090305][T32248] should_failslab+0x9/0x20 [ 2854.094641][T32248] kmem_cache_alloc+0x4f/0x2f0 [ 2854.099240][T32248] ? anon_vma_fork+0xf7/0x4f0 [ 2854.103754][T32248] anon_vma_fork+0xf7/0x4f0 [ 2854.108095][T32248] ? anon_vma_name+0x4c/0x70 [ 2854.112517][T32248] dup_mmap+0x750/0xea0 [ 2854.116516][T32248] ? __delayed_free_task+0x20/0x20 [ 2854.121458][T32248] ? mm_init+0x807/0x960 [ 2854.125537][T32248] dup_mm+0x91/0x330 [ 2854.129274][T32248] copy_mm+0x108/0x1b0 [ 2854.133175][T32248] copy_process+0x1295/0x3250 [ 2854.137687][T32248] ? proc_fail_nth_write+0x213/0x290 [ 2854.142808][T32248] ? proc_fail_nth_read+0x220/0x220 [ 2854.147843][T32248] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2854.152788][T32248] ? vfs_write+0x9af/0x1050 [ 2854.157128][T32248] ? vmacache_update+0xb7/0x120 [ 2854.161814][T32248] kernel_clone+0x22d/0x990 [ 2854.166153][T32248] ? file_end_write+0x1b0/0x1b0 [ 2854.170839][T32248] ? __kasan_check_write+0x14/0x20 [ 2854.175792][T32248] ? create_io_thread+0x1e0/0x1e0 [ 2854.180650][T32248] ? __mutex_lock_slowpath+0x10/0x10 [ 2854.185769][T32248] __x64_sys_clone+0x289/0x310 [ 2854.190368][T32248] ? __do_sys_vfork+0x130/0x130 [ 2854.195057][T32248] ? debug_smp_processor_id+0x17/0x20 [ 2854.200263][T32248] do_syscall_64+0x44/0xd0 [ 2854.204516][T32248] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2854.210244][T32248] RIP: 0033:0x7f4243ed90d9 [ 2854.214497][T32248] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:42:02 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 49) 07:42:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1\x00', 0x400}) 07:42:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0xc, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000f0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'wlan0\x00', @multicast}) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) (async) close(r0) [ 2854.233938][T32248] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2854.242182][T32248] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2854.249994][T32248] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2854.257805][T32248] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2854.265618][T32248] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2854.273429][T32248] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2854.281240][T32248] 07:42:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1\x00', 0x400}) 07:42:02 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) 07:42:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0xd, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000100000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2854.295513][T32267] FAULT_INJECTION: forcing a failure. [ 2854.295513][T32267] name failslab, interval 1, probability 0, space 0, times 0 [ 2854.310043][T32267] CPU: 1 PID: 32267 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2854.320099][T32267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2854.329993][T32267] Call Trace: [ 2854.333117][T32267] [ 2854.335895][T32267] dump_stack_lvl+0x151/0x1b7 [ 2854.340409][T32267] ? bfq_pos_tree_add_move+0x43e/0x43e 07:42:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0xe, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x10, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x11, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2854.345707][T32267] dump_stack+0x15/0x17 [ 2854.349697][T32267] should_fail+0x3c0/0x510 [ 2854.353953][T32267] __should_failslab+0x9f/0xe0 [ 2854.358557][T32267] should_failslab+0x9/0x20 [ 2854.362890][T32267] kmem_cache_alloc+0x4f/0x2f0 [ 2854.367489][T32267] ? anon_vma_fork+0x1b9/0x4f0 [ 2854.372089][T32267] anon_vma_fork+0x1b9/0x4f0 [ 2854.376516][T32267] dup_mmap+0x750/0xea0 [ 2854.380509][T32267] ? __delayed_free_task+0x20/0x20 [ 2854.385454][T32267] ? mm_init+0x807/0x960 [ 2854.389530][T32267] dup_mm+0x91/0x330 [ 2854.393263][T32267] copy_mm+0x108/0x1b0 [ 2854.397172][T32267] copy_process+0x1295/0x3250 [ 2854.401681][T32267] ? proc_fail_nth_write+0x213/0x290 [ 2854.406804][T32267] ? proc_fail_nth_read+0x220/0x220 [ 2854.411839][T32267] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2854.416786][T32267] ? vfs_write+0x9af/0x1050 [ 2854.421125][T32267] ? vmacache_update+0xb7/0x120 [ 2854.425811][T32267] kernel_clone+0x22d/0x990 [ 2854.430148][T32267] ? file_end_write+0x1b0/0x1b0 [ 2854.434835][T32267] ? __kasan_check_write+0x14/0x20 [ 2854.439782][T32267] ? create_io_thread+0x1e0/0x1e0 [ 2854.444642][T32267] ? __mutex_lock_slowpath+0x10/0x10 [ 2854.449768][T32267] __x64_sys_clone+0x289/0x310 [ 2854.454366][T32267] ? __do_sys_vfork+0x130/0x130 [ 2854.459050][T32267] ? debug_smp_processor_id+0x17/0x20 [ 2854.464257][T32267] do_syscall_64+0x44/0xd0 [ 2854.468510][T32267] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2854.474237][T32267] RIP: 0033:0x7f4243ed90d9 [ 2854.478489][T32267] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2854.497934][T32267] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2854.506177][T32267] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2854.513987][T32267] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2854.521797][T32267] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2854.529609][T32267] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2854.537420][T32267] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 07:42:02 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 50) 07:42:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x12, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) (async, rerun: 32) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'wlan0\x00', @multicast}) (async, rerun: 32) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) (async) close(r0) 07:42:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x141081, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:02 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000110000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x1, 0x1, 0x1, 0x0, 0xffffffffffff6082, 0x40081, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x4e4e, 0x1, 0xbd, 0x1, 0x5, 0x7, 0x800, 0x0, 0xfffeffff, 0x0, 0x9c70}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x310, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2854.545235][T32267] [ 2854.559386][T32296] FAULT_INJECTION: forcing a failure. [ 2854.559386][T32296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2854.581116][T32296] CPU: 1 PID: 32296 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 07:42:02 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000120000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x141081, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) write$cgroup_pressure(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x141081, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) 07:42:02 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000100)="3f1651b57a192f047e2a7bc112ac94ca6a21b4e8845ecbcb30386accb9b6b349273f41f92dbfdc7dba4523d476910ec47659786909a67f02515aac770bbae383f4e5568795bb7114a02a05c1ee836db5f49a2ad11ed4f219703a47d0475375e5293b3d4fd08f48b6becd44", &(0x7f0000000080)=""/24, 0x4}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4e, 0x4e, 0x5, [@datasec={0x3, 0x2, 0x0, 0xf, 0x2, [{0x2, 0xcd58, 0x80}, {0x4, 0x2, 0x4}], "63b5"}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x53}, @restrict={0xb, 0x0, 0x0, 0xb, 0x5}, @typedef={0xd, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x30, 0x0, 0x5f]}}, &(0x7f0000000240)=""/11, 0x6d, 0xb, 0x1}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r1, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x5, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80}, [@alu={0x4, 0x0, 0xa, 0xa, 0xc, 0x50, 0x10}, @exit]}, &(0x7f0000000700)='GPL\x00', 0x7ff, 0x1000, &(0x7f0000000b00)=""/4096, 0x41100, 0x8, '\x00', r2, 0x25, r0, 0x8, &(0x7f0000000800)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0x2, 0x9, 0xfffffffb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r1]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0xa, [@fwd={0xe}, @fwd={0xf}, @volatile={0xf}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x7, 0x2}, {0x9}, {0x7, 0x4}, {0x7, 0x1}]}, @enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0xe, 0x80}, {0x1, 0x6}, {0x3, 0x800}, {0xa, 0x2}, {0x4, 0x5}, {0x0, 0x8}, {0x6, 0x40}, {0xb, 0x1}]}, @ptr={0x3, 0x0, 0x0, 0x2, 0x5}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0x9, 0x4}, {0x1, 0x2}, {0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @enum={0x9, 0x2, 0x0, 0x6, 0x4, [{0x1, 0x9}, {0xa, 0x8}]}, @ptr={0xd, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x5f, 0x2e, 0x5f, 0x2e, 0x30, 0x61, 0x2e, 0x61]}}, &(0x7f00000005c0)=""/139, 0x126, 0x8b}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb0ab}]}, &(0x7f0000000180)='GPL\x00', 0x20000000, 0x0, 0x0, 0x40f00, 0x11, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xb, 0xfffffe00, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r1]}, 0x80) close(0xffffffffffffffff) close(0xffffffffffffffff) 07:42:02 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000180000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2854.591175][T32296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2854.601073][T32296] Call Trace: [ 2854.604196][T32296] [ 2854.606973][T32296] dump_stack_lvl+0x151/0x1b7 [ 2854.611490][T32296] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2854.616781][T32296] ? stack_trace_save+0x1f0/0x1f0 [ 2854.621639][T32296] ? __kernel_text_address+0x9a/0x110 [ 2854.626849][T32296] dump_stack+0x15/0x17 [ 2854.630844][T32296] should_fail+0x3c0/0x510 [ 2854.635096][T32296] should_fail_alloc_page+0x58/0x70 [ 2854.640125][T32296] __alloc_pages+0x1de/0x7c0 07:42:03 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000001f0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2854.644553][T32296] ? stack_trace_save+0x12d/0x1f0 [ 2854.649412][T32296] ? stack_trace_snprint+0x100/0x100 [ 2854.654541][T32296] ? __count_vm_events+0x30/0x30 [ 2854.659309][T32296] ? __kasan_slab_alloc+0xc4/0xe0 [ 2854.664166][T32296] ? __kasan_slab_alloc+0xb2/0xe0 [ 2854.669024][T32296] ? kmem_cache_alloc+0x189/0x2f0 [ 2854.673886][T32296] ? anon_vma_fork+0x1b9/0x4f0 [ 2854.678488][T32296] get_zeroed_page+0x19/0x40 [ 2854.682918][T32296] __pud_alloc+0x8b/0x260 [ 2854.687083][T32296] ? do_handle_mm_fault+0x2370/0x2370 [ 2854.692290][T32296] copy_page_range+0xd9e/0x1090 [ 2854.696982][T32296] ? pfn_valid+0x1e0/0x1e0 [ 2854.701230][T32296] dup_mmap+0x99f/0xea0 [ 2854.705222][T32296] ? __delayed_free_task+0x20/0x20 [ 2854.710168][T32296] ? mm_init+0x807/0x960 [ 2854.714246][T32296] dup_mm+0x91/0x330 [ 2854.717974][T32296] copy_mm+0x108/0x1b0 [ 2854.721883][T32296] copy_process+0x1295/0x3250 [ 2854.726396][T32296] ? proc_fail_nth_write+0x213/0x290 [ 2854.731515][T32296] ? proc_fail_nth_read+0x220/0x220 [ 2854.736548][T32296] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2854.741497][T32296] ? vfs_write+0x9af/0x1050 [ 2854.745838][T32296] ? vmacache_update+0xb7/0x120 [ 2854.750521][T32296] kernel_clone+0x22d/0x990 [ 2854.754860][T32296] ? file_end_write+0x1b0/0x1b0 [ 2854.759548][T32296] ? __kasan_check_write+0x14/0x20 [ 2854.764493][T32296] ? create_io_thread+0x1e0/0x1e0 [ 2854.769355][T32296] ? __mutex_lock_slowpath+0x10/0x10 [ 2854.774476][T32296] __x64_sys_clone+0x289/0x310 [ 2854.779076][T32296] ? __do_sys_vfork+0x130/0x130 [ 2854.783762][T32296] ? debug_smp_processor_id+0x17/0x20 [ 2854.788971][T32296] do_syscall_64+0x44/0xd0 [ 2854.793223][T32296] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2854.798951][T32296] RIP: 0033:0x7f4243ed90d9 [ 2854.803205][T32296] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2854.822644][T32296] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2854.830891][T32296] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2854.838700][T32296] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 07:42:03 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 51) 07:42:03 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000100)="3f1651b57a192f047e2a7bc112ac94ca6a21b4e8845ecbcb30386accb9b6b349273f41f92dbfdc7dba4523d476910ec47659786909a67f02515aac770bbae383f4e5568795bb7114a02a05c1ee836db5f49a2ad11ed4f219703a47d0475375e5293b3d4fd08f48b6becd44", &(0x7f0000000080)=""/24, 0x4}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4e, 0x4e, 0x5, [@datasec={0x3, 0x2, 0x0, 0xf, 0x2, [{0x2, 0xcd58, 0x80}, {0x4, 0x2, 0x4}], "63b5"}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x53}, @restrict={0xb, 0x0, 0x0, 0xb, 0x5}, @typedef={0xd, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x30, 0x0, 0x5f]}}, &(0x7f0000000240)=""/11, 0x6d, 0xb, 0x1}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r1, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x5, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80}, [@alu={0x4, 0x0, 0xa, 0xa, 0xc, 0x50, 0x10}, @exit]}, &(0x7f0000000700)='GPL\x00', 0x7ff, 0x1000, &(0x7f0000000b00)=""/4096, 0x41100, 0x8, '\x00', r2, 0x25, r0, 0x8, &(0x7f0000000800)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0x2, 0x9, 0xfffffffb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r1]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0xa, [@fwd={0xe}, @fwd={0xf}, @volatile={0xf}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x7, 0x2}, {0x9}, {0x7, 0x4}, {0x7, 0x1}]}, @enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0xe, 0x80}, {0x1, 0x6}, {0x3, 0x800}, {0xa, 0x2}, {0x4, 0x5}, {0x0, 0x8}, {0x6, 0x40}, {0xb, 0x1}]}, @ptr={0x3, 0x0, 0x0, 0x2, 0x5}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0x9, 0x4}, {0x1, 0x2}, {0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @enum={0x9, 0x2, 0x0, 0x6, 0x4, [{0x1, 0x9}, {0xa, 0x8}]}, @ptr={0xd, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x5f, 0x2e, 0x5f, 0x2e, 0x30, 0x61, 0x2e, 0x61]}}, &(0x7f00000005c0)=""/139, 0x126, 0x8b}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb0ab}]}, &(0x7f0000000180)='GPL\x00', 0x20000000, 0x0, 0x0, 0x40f00, 0x11, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xb, 0xfffffe00, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r1]}, 0x80) close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000100)="3f1651b57a192f047e2a7bc112ac94ca6a21b4e8845ecbcb30386accb9b6b349273f41f92dbfdc7dba4523d476910ec47659786909a67f02515aac770bbae383f4e5568795bb7114a02a05c1ee836db5f49a2ad11ed4f219703a47d0475375e5293b3d4fd08f48b6becd44", &(0x7f0000000080)=""/24, 0x4}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4e, 0x4e, 0x5, [@datasec={0x3, 0x2, 0x0, 0xf, 0x2, [{0x2, 0xcd58, 0x80}, {0x4, 0x2, 0x4}], "63b5"}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x53}, @restrict={0xb, 0x0, 0x0, 0xb, 0x5}, @typedef={0xd, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x30, 0x0, 0x5f]}}, &(0x7f0000000240)=""/11, 0x6d, 0xb, 0x1}, 0x20) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='\x00', 0x0, 0x10}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r1, 0x58, &(0x7f0000000740)}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x5, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80}, [@alu={0x4, 0x0, 0xa, 0xa, 0xc, 0x50, 0x10}, @exit]}, &(0x7f0000000700)='GPL\x00', 0x7ff, 0x1000, &(0x7f0000000b00)=""/4096, 0x41100, 0x8, '\x00', r2, 0x25, r0, 0x8, &(0x7f0000000800)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0x2, 0x9, 0xfffffffb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r1]}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0xa, [@fwd={0xe}, @fwd={0xf}, @volatile={0xf}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x7, 0x2}, {0x9}, {0x7, 0x4}, {0x7, 0x1}]}, @enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0xe, 0x80}, {0x1, 0x6}, {0x3, 0x800}, {0xa, 0x2}, {0x4, 0x5}, {0x0, 0x8}, {0x6, 0x40}, {0xb, 0x1}]}, @ptr={0x3, 0x0, 0x0, 0x2, 0x5}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0x9, 0x4}, {0x1, 0x2}, {0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @enum={0x9, 0x2, 0x0, 0x6, 0x4, [{0x1, 0x9}, {0xa, 0x8}]}, @ptr={0xd, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x5f, 0x2e, 0x5f, 0x2e, 0x30, 0x61, 0x2e, 0x61]}}, &(0x7f00000005c0)=""/139, 0x126, 0x8b}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb0ab}]}, &(0x7f0000000180)='GPL\x00', 0x20000000, 0x0, 0x0, 0x40f00, 0x11, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xb, 0xfffffe00, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r1]}, 0x80) (async) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) (async) 07:42:03 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x852c, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x141081, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) write$cgroup_pressure(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x141081, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) 07:42:03 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000200000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2854.846513][T32296] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2854.854322][T32296] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2854.862136][T32296] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2854.869947][T32296] [ 2854.887206][T32332] FAULT_INJECTION: forcing a failure. 07:42:03 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async, rerun: 64) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) (rerun: 64) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x1, 0x1, 0x1, 0x0, 0xffffffffffff6082, 0x40081, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x4e4e, 0x1, 0xbd, 0x1, 0x5, 0x7, 0x800, 0x0, 0xfffeffff, 0x0, 0x9c70}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:03 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0xfdf0, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:03 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000250000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:03 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:03 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x10, 0x0}, 0x80) [ 2854.887206][T32332] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2854.902053][T32332] CPU: 1 PID: 32332 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2854.912110][T32332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2854.922006][T32332] Call Trace: [ 2854.925129][T32332] [ 2854.927908][T32332] dump_stack_lvl+0x151/0x1b7 [ 2854.932419][T32332] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2854.937714][T32332] ? stack_trace_save+0x1f0/0x1f0 [ 2854.942573][T32332] ? __kernel_text_address+0x9a/0x110 07:42:03 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x3, 0x10, 0x0}, 0x80) 07:42:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x366f40, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x6240, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000040)=0x7) write$cgroup_pressure(r0, 0x0, 0x0) [ 2854.947782][T32332] dump_stack+0x15/0x17 [ 2854.951776][T32332] should_fail+0x3c0/0x510 [ 2854.956028][T32332] should_fail_alloc_page+0x58/0x70 [ 2854.961061][T32332] __alloc_pages+0x1de/0x7c0 [ 2854.965489][T32332] ? stack_trace_save+0x12d/0x1f0 [ 2854.970350][T32332] ? stack_trace_snprint+0x100/0x100 [ 2854.975466][T32332] ? __count_vm_events+0x30/0x30 [ 2854.980243][T32332] ? __kasan_slab_alloc+0xc4/0xe0 [ 2854.985104][T32332] ? __kasan_slab_alloc+0xb2/0xe0 [ 2854.989964][T32332] ? kmem_cache_alloc+0x189/0x2f0 [ 2854.994826][T32332] ? anon_vma_fork+0x1b9/0x4f0 [ 2854.999421][T32332] get_zeroed_page+0x19/0x40 [ 2855.003849][T32332] __pud_alloc+0x8b/0x260 [ 2855.008014][T32332] ? do_handle_mm_fault+0x2370/0x2370 [ 2855.013219][T32332] copy_page_range+0xd9e/0x1090 [ 2855.017908][T32332] ? pfn_valid+0x1e0/0x1e0 [ 2855.022158][T32332] dup_mmap+0x99f/0xea0 [ 2855.026152][T32332] ? __delayed_free_task+0x20/0x20 [ 2855.031096][T32332] ? mm_init+0x807/0x960 [ 2855.035177][T32332] dup_mm+0x91/0x330 [ 2855.038907][T32332] copy_mm+0x108/0x1b0 [ 2855.042816][T32332] copy_process+0x1295/0x3250 [ 2855.047329][T32332] ? proc_fail_nth_write+0x213/0x290 [ 2855.052450][T32332] ? proc_fail_nth_read+0x220/0x220 [ 2855.057484][T32332] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2855.062430][T32332] ? vfs_write+0x9af/0x1050 [ 2855.066770][T32332] ? vmacache_update+0xb7/0x120 [ 2855.071458][T32332] kernel_clone+0x22d/0x990 [ 2855.075795][T32332] ? file_end_write+0x1b0/0x1b0 [ 2855.080480][T32332] ? __kasan_check_write+0x14/0x20 [ 2855.085428][T32332] ? create_io_thread+0x1e0/0x1e0 [ 2855.090290][T32332] ? __mutex_lock_slowpath+0x10/0x10 [ 2855.095409][T32332] __x64_sys_clone+0x289/0x310 [ 2855.100010][T32332] ? __do_sys_vfork+0x130/0x130 [ 2855.104702][T32332] ? debug_smp_processor_id+0x17/0x20 [ 2855.109903][T32332] do_syscall_64+0x44/0xd0 [ 2855.114156][T32332] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2855.119884][T32332] RIP: 0033:0x7f4243ed90d9 [ 2855.124138][T32332] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:42:03 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 52) 07:42:03 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000003c0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:03 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4, 0x10, 0x0}, 0x80) 07:42:03 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000100)="3f1651b57a192f047e2a7bc112ac94ca6a21b4e8845ecbcb30386accb9b6b349273f41f92dbfdc7dba4523d476910ec47659786909a67f02515aac770bbae383f4e5568795bb7114a02a05c1ee836db5f49a2ad11ed4f219703a47d0475375e5293b3d4fd08f48b6becd44", &(0x7f0000000080)=""/24, 0x4}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4e, 0x4e, 0x5, [@datasec={0x3, 0x2, 0x0, 0xf, 0x2, [{0x2, 0xcd58, 0x80}, {0x4, 0x2, 0x4}], "63b5"}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x53}, @restrict={0xb, 0x0, 0x0, 0xb, 0x5}, @typedef={0xd, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x30, 0x0, 0x5f]}}, &(0x7f0000000240)=""/11, 0x6d, 0xb, 0x1}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r1, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x5, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80}, [@alu={0x4, 0x0, 0xa, 0xa, 0xc, 0x50, 0x10}, @exit]}, &(0x7f0000000700)='GPL\x00', 0x7ff, 0x1000, &(0x7f0000000b00)=""/4096, 0x41100, 0x8, '\x00', r2, 0x25, r0, 0x8, &(0x7f0000000800)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0x2, 0x9, 0xfffffffb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r1]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0xa, [@fwd={0xe}, @fwd={0xf}, @volatile={0xf}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x7, 0x2}, {0x9}, {0x7, 0x4}, {0x7, 0x1}]}, @enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0xe, 0x80}, {0x1, 0x6}, {0x3, 0x800}, {0xa, 0x2}, {0x4, 0x5}, {0x0, 0x8}, {0x6, 0x40}, {0xb, 0x1}]}, @ptr={0x3, 0x0, 0x0, 0x2, 0x5}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0x9, 0x4}, {0x1, 0x2}, {0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @enum={0x9, 0x2, 0x0, 0x6, 0x4, [{0x1, 0x9}, {0xa, 0x8}]}, @ptr={0xd, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x5f, 0x2e, 0x5f, 0x2e, 0x30, 0x61, 0x2e, 0x61]}}, &(0x7f00000005c0)=""/139, 0x126, 0x8b}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb0ab}]}, &(0x7f0000000180)='GPL\x00', 0x20000000, 0x0, 0x0, 0x40f00, 0x11, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xb, 0xfffffe00, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r1]}, 0x80) close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000100)="3f1651b57a192f047e2a7bc112ac94ca6a21b4e8845ecbcb30386accb9b6b349273f41f92dbfdc7dba4523d476910ec47659786909a67f02515aac770bbae383f4e5568795bb7114a02a05c1ee836db5f49a2ad11ed4f219703a47d0475375e5293b3d4fd08f48b6becd44", &(0x7f0000000080)=""/24, 0x4}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4e, 0x4e, 0x5, [@datasec={0x3, 0x2, 0x0, 0xf, 0x2, [{0x2, 0xcd58, 0x80}, {0x4, 0x2, 0x4}], "63b5"}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x53}, @restrict={0xb, 0x0, 0x0, 0xb, 0x5}, @typedef={0xd, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x30, 0x0, 0x5f]}}, &(0x7f0000000240)=""/11, 0x6d, 0xb, 0x1}, 0x20) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='\x00', 0x0, 0x10}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r1, 0x58, &(0x7f0000000740)}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x5, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80}, [@alu={0x4, 0x0, 0xa, 0xa, 0xc, 0x50, 0x10}, @exit]}, &(0x7f0000000700)='GPL\x00', 0x7ff, 0x1000, &(0x7f0000000b00)=""/4096, 0x41100, 0x8, '\x00', r2, 0x25, r0, 0x8, &(0x7f0000000800)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0x2, 0x9, 0xfffffffb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r1]}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0xa, [@fwd={0xe}, @fwd={0xf}, @volatile={0xf}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x7, 0x2}, {0x9}, {0x7, 0x4}, {0x7, 0x1}]}, @enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0xe, 0x80}, {0x1, 0x6}, {0x3, 0x800}, {0xa, 0x2}, {0x4, 0x5}, {0x0, 0x8}, {0x6, 0x40}, {0xb, 0x1}]}, @ptr={0x3, 0x0, 0x0, 0x2, 0x5}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0x9, 0x4}, {0x1, 0x2}, {0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @enum={0x9, 0x2, 0x0, 0x6, 0x4, [{0x1, 0x9}, {0xa, 0x8}]}, @ptr={0xd, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x5f, 0x2e, 0x5f, 0x2e, 0x30, 0x61, 0x2e, 0x61]}}, &(0x7f00000005c0)=""/139, 0x126, 0x8b}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb0ab}]}, &(0x7f0000000180)='GPL\x00', 0x20000000, 0x0, 0x0, 0x40f00, 0x11, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xb, 0xfffffe00, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r1]}, 0x80) (async) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) (async) 07:42:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x366f40, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x6240, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000040)=0x7) write$cgroup_pressure(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x366f40, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x6240, 0x0) (async) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) (async) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000040)=0x7) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) 07:42:03 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x1, 0x1, 0x1, 0x0, 0xffffffffffff6082, 0x40081, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x4e4e, 0x1, 0xbd, 0x1, 0x5, 0x7, 0x800, 0x0, 0xfffeffff, 0x0, 0x9c70}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x1, 0x1, 0x1, 0x0, 0xffffffffffff6082, 0x40081, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x4e4e, 0x1, 0xbd, 0x1, 0x5, 0x7, 0x800, 0x0, 0xfffeffff, 0x0, 0x9c70}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) 07:42:03 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x5, 0x10, 0x0}, 0x80) 07:42:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x366f40, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x6240, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) (async) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000040)=0x7) write$cgroup_pressure(r0, 0x0, 0x0) [ 2855.143578][T32332] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2855.151824][T32332] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2855.159635][T32332] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2855.167446][T32332] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2855.175256][T32332] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2855.183067][T32332] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2855.190881][T32332] 07:42:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) close(r0) 07:42:03 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000003f0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:03 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000400000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000380)=0xe5) write$cgroup_pressure(r0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="7199e1f4b1567e1c7673ce570d2e1f1b7955f8bbc09e985ae549d4c563e395ef6f2f3bede12469043125cb5eac45657c7400cb5dd416221978a06055e51fe5c5b33261bcf3a453fcf00313fb76e899fa7c276badfc044b93d16e0af6aac26631f7d349062c7f674ea70ef4ead92b0b3ec7912f8fac24d28910959902670bd865406bac2e4a804895beeb9c8efe3e1f16769f4fef52543760ac4c5ab39dc8e71c4a48a6ed3c90489428ca138abcc1b25a89d485af3b26efcfeb8746f78387e9ae2244509bc23e9157e9bfab7be6fe8c0ea7dcee07725b08aa69b9ffe1ee6cd277dff02299b779c7025a", 0xe9}, {&(0x7f0000000100)="1e4b6b5a9df86d536382c2412476d6397b98cefc865ffc254b67222a82917b4001586e805739d0e4e06ab6d5fb7e470111836d", 0x33}, {&(0x7f0000000140)="eaec56bab6448d2d0024243d42dd25c30ee047bfd73b276dad9966c65fb0afe4138c0f64843545799c964c61872ede9bfe9133e1a18ba539ce93ad0aa5e218bf1fbda0503a30a480f4713712ff2315e13d4c0c5c1eb4e0c592fe38612fd40d9565b5", 0x62}, {&(0x7f00000001c0)="ef", 0x1}, {&(0x7f0000000200)="87bf9a1fec71d9c047d0314c4e047da3ba5dbf3b545d9094e59e35f7faf759fa", 0x20}], 0x5, &(0x7f00000002c0)="b504cc48fc4a8e8816542dae7512c34783651a2e5436dc8164811d4d446a971e519f9810ad87e4034c0ad5d7f53a7bcb690a42d021e893b3ccdf651080664d88ace6675277a0f32865e7fc4ecb0b4c94b4f80c", 0x53, 0x84}, 0x0) [ 2855.239670][T32390] FAULT_INJECTION: forcing a failure. [ 2855.239670][T32390] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2855.261798][T32390] CPU: 1 PID: 32390 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2855.271862][T32390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2855.281753][T32390] Call Trace: [ 2855.284879][T32390] [ 2855.287655][T32390] dump_stack_lvl+0x151/0x1b7 [ 2855.292170][T32390] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2855.297464][T32390] dump_stack+0x15/0x17 [ 2855.301460][T32390] should_fail+0x3c0/0x510 [ 2855.305707][T32390] should_fail_alloc_page+0x58/0x70 [ 2855.310744][T32390] __alloc_pages+0x1de/0x7c0 [ 2855.315165][T32390] ? __count_vm_events+0x30/0x30 [ 2855.319936][T32390] ? dup_mm+0x91/0x330 [ 2855.323843][T32390] ? copy_mm+0x108/0x1b0 [ 2855.327922][T32390] ? copy_process+0x1295/0x3250 [ 2855.332608][T32390] ? kernel_clone+0x22d/0x990 [ 2855.337120][T32390] ? __x64_sys_clone+0x289/0x310 [ 2855.341897][T32390] pte_alloc_one+0x73/0x1b0 [ 2855.346234][T32390] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2855.351267][T32390] ? __kasan_check_write+0x14/0x20 [ 2855.356217][T32390] ? __set_page_owner+0x2ee/0x310 [ 2855.361076][T32390] __pte_alloc+0x86/0x350 [ 2855.365240][T32390] ? post_alloc_hook+0x1ab/0x1b0 [ 2855.370016][T32390] ? free_pgtables+0x210/0x210 [ 2855.374616][T32390] ? get_page_from_freelist+0x38b/0x400 [ 2855.379997][T32390] copy_pte_range+0x1b1f/0x20b0 [ 2855.384686][T32390] ? __kunmap_atomic+0x80/0x80 [ 2855.389283][T32390] ? __pud_alloc+0x260/0x260 [ 2855.393709][T32390] ? __pud_alloc+0x218/0x260 [ 2855.398137][T32390] ? do_handle_mm_fault+0x2370/0x2370 [ 2855.403344][T32390] copy_page_range+0xc1e/0x1090 [ 2855.408033][T32390] ? pfn_valid+0x1e0/0x1e0 [ 2855.412284][T32390] dup_mmap+0x99f/0xea0 [ 2855.416277][T32390] ? __delayed_free_task+0x20/0x20 [ 2855.421222][T32390] ? mm_init+0x807/0x960 [ 2855.425302][T32390] dup_mm+0x91/0x330 [ 2855.429034][T32390] copy_mm+0x108/0x1b0 [ 2855.432940][T32390] copy_process+0x1295/0x3250 [ 2855.437452][T32390] ? proc_fail_nth_write+0x213/0x290 [ 2855.442575][T32390] ? proc_fail_nth_read+0x220/0x220 [ 2855.447608][T32390] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2855.452552][T32390] ? vfs_write+0x9af/0x1050 [ 2855.456892][T32390] ? vmacache_update+0xb7/0x120 [ 2855.461579][T32390] kernel_clone+0x22d/0x990 [ 2855.465919][T32390] ? file_end_write+0x1b0/0x1b0 [ 2855.470607][T32390] ? __kasan_check_write+0x14/0x20 [ 2855.475553][T32390] ? create_io_thread+0x1e0/0x1e0 [ 2855.480413][T32390] ? __mutex_lock_slowpath+0x10/0x10 [ 2855.485533][T32390] __x64_sys_clone+0x289/0x310 [ 2855.490134][T32390] ? __do_sys_vfork+0x130/0x130 [ 2855.494823][T32390] ? debug_smp_processor_id+0x17/0x20 [ 2855.500027][T32390] do_syscall_64+0x44/0xd0 [ 2855.504281][T32390] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2855.510008][T32390] RIP: 0033:0x7f4243ed90d9 [ 2855.514267][T32390] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:42:03 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 53) 07:42:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) (async) close(r0) 07:42:03 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x6, 0x10, 0x0}, 0x80) 07:42:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000380)=0xe5) (async, rerun: 64) write$cgroup_pressure(r0, 0x0, 0x0) (rerun: 64) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="7199e1f4b1567e1c7673ce570d2e1f1b7955f8bbc09e985ae549d4c563e395ef6f2f3bede12469043125cb5eac45657c7400cb5dd416221978a06055e51fe5c5b33261bcf3a453fcf00313fb76e899fa7c276badfc044b93d16e0af6aac26631f7d349062c7f674ea70ef4ead92b0b3ec7912f8fac24d28910959902670bd865406bac2e4a804895beeb9c8efe3e1f16769f4fef52543760ac4c5ab39dc8e71c4a48a6ed3c90489428ca138abcc1b25a89d485af3b26efcfeb8746f78387e9ae2244509bc23e9157e9bfab7be6fe8c0ea7dcee07725b08aa69b9ffe1ee6cd277dff02299b779c7025a", 0xe9}, {&(0x7f0000000100)="1e4b6b5a9df86d536382c2412476d6397b98cefc865ffc254b67222a82917b4001586e805739d0e4e06ab6d5fb7e470111836d", 0x33}, {&(0x7f0000000140)="eaec56bab6448d2d0024243d42dd25c30ee047bfd73b276dad9966c65fb0afe4138c0f64843545799c964c61872ede9bfe9133e1a18ba539ce93ad0aa5e218bf1fbda0503a30a480f4713712ff2315e13d4c0c5c1eb4e0c592fe38612fd40d9565b5", 0x62}, {&(0x7f00000001c0)="ef", 0x1}, {&(0x7f0000000200)="87bf9a1fec71d9c047d0314c4e047da3ba5dbf3b545d9094e59e35f7faf759fa", 0x20}], 0x5, &(0x7f00000002c0)="b504cc48fc4a8e8816542dae7512c34783651a2e5436dc8164811d4d446a971e519f9810ad87e4034c0ad5d7f53a7bcb690a42d021e893b3ccdf651080664d88ace6675277a0f32865e7fc4ecb0b4c94b4f80c", 0x53, 0x84}, 0x0) 07:42:03 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000480000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:03 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x1, &(0x7f0000000080)=@raw=[@ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)=""/98, 0x62}, {&(0x7f00000001c0)=""/159, 0x9f}], 0x2}, 0x40000000) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000480)=""/4096) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.time\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000300)={0x0, 0x4, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}, @random="3e04794a97b5", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="26274c43c937"]}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) [ 2855.533705][T32390] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2855.541946][T32390] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2855.549760][T32390] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2855.557570][T32390] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2855.565382][T32390] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2855.573191][T32390] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2855.581006][T32390] 07:42:03 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000004c0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x7, 0x10, 0x0}, 0x80) 07:42:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000380)=0xe5) (async) write$cgroup_pressure(r0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="7199e1f4b1567e1c7673ce570d2e1f1b7955f8bbc09e985ae549d4c563e395ef6f2f3bede12469043125cb5eac45657c7400cb5dd416221978a06055e51fe5c5b33261bcf3a453fcf00313fb76e899fa7c276badfc044b93d16e0af6aac26631f7d349062c7f674ea70ef4ead92b0b3ec7912f8fac24d28910959902670bd865406bac2e4a804895beeb9c8efe3e1f16769f4fef52543760ac4c5ab39dc8e71c4a48a6ed3c90489428ca138abcc1b25a89d485af3b26efcfeb8746f78387e9ae2244509bc23e9157e9bfab7be6fe8c0ea7dcee07725b08aa69b9ffe1ee6cd277dff02299b779c7025a", 0xe9}, {&(0x7f0000000100)="1e4b6b5a9df86d536382c2412476d6397b98cefc865ffc254b67222a82917b4001586e805739d0e4e06ab6d5fb7e470111836d", 0x33}, {&(0x7f0000000140)="eaec56bab6448d2d0024243d42dd25c30ee047bfd73b276dad9966c65fb0afe4138c0f64843545799c964c61872ede9bfe9133e1a18ba539ce93ad0aa5e218bf1fbda0503a30a480f4713712ff2315e13d4c0c5c1eb4e0c592fe38612fd40d9565b5", 0x62}, {&(0x7f00000001c0)="ef", 0x1}, {&(0x7f0000000200)="87bf9a1fec71d9c047d0314c4e047da3ba5dbf3b545d9094e59e35f7faf759fa", 0x20}], 0x5, &(0x7f00000002c0)="b504cc48fc4a8e8816542dae7512c34783651a2e5436dc8164811d4d446a971e519f9810ad87e4034c0ad5d7f53a7bcb690a42d021e893b3ccdf651080664d88ace6675277a0f32865e7fc4ecb0b4c94b4f80c", 0x53, 0x84}, 0x0) 07:42:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(0xffffffffffffffff) (async) close(r0) (async) [ 2855.597224][T32407] FAULT_INJECTION: forcing a failure. [ 2855.597224][T32407] name failslab, interval 1, probability 0, space 0, times 0 [ 2855.611148][T32407] CPU: 1 PID: 32407 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2855.621205][T32407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2855.631360][T32407] Call Trace: [ 2855.634482][T32407] [ 2855.637289][T32407] dump_stack_lvl+0x151/0x1b7 [ 2855.641776][T32407] ? bfq_pos_tree_add_move+0x43e/0x43e 07:42:04 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000610000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x10, 0x0}, 0x80) [ 2855.647073][T32407] dump_stack+0x15/0x17 [ 2855.651063][T32407] should_fail+0x3c0/0x510 [ 2855.655311][T32407] __should_failslab+0x9f/0xe0 [ 2855.659914][T32407] should_failslab+0x9/0x20 [ 2855.664253][T32407] kmem_cache_alloc+0x4f/0x2f0 [ 2855.668857][T32407] ? vm_area_dup+0x26/0x1d0 [ 2855.673193][T32407] vm_area_dup+0x26/0x1d0 [ 2855.677362][T32407] dup_mmap+0x6b8/0xea0 [ 2855.681440][T32407] ? __delayed_free_task+0x20/0x20 [ 2855.686385][T32407] ? mm_init+0x807/0x960 [ 2855.690461][T32407] dup_mm+0x91/0x330 [ 2855.694194][T32407] copy_mm+0x108/0x1b0 [ 2855.698101][T32407] copy_process+0x1295/0x3250 [ 2855.702615][T32407] ? proc_fail_nth_write+0x213/0x290 [ 2855.707736][T32407] ? proc_fail_nth_read+0x220/0x220 [ 2855.712766][T32407] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2855.717712][T32407] ? vfs_write+0x9af/0x1050 [ 2855.722058][T32407] ? vmacache_update+0xb7/0x120 [ 2855.726737][T32407] kernel_clone+0x22d/0x990 [ 2855.731077][T32407] ? file_end_write+0x1b0/0x1b0 [ 2855.735768][T32407] ? __kasan_check_write+0x14/0x20 [ 2855.740715][T32407] ? create_io_thread+0x1e0/0x1e0 [ 2855.745574][T32407] ? __mutex_lock_slowpath+0x10/0x10 [ 2855.750695][T32407] __x64_sys_clone+0x289/0x310 [ 2855.755298][T32407] ? __do_sys_vfork+0x130/0x130 [ 2855.759979][T32407] ? debug_smp_processor_id+0x17/0x20 [ 2855.765188][T32407] do_syscall_64+0x44/0xd0 [ 2855.769440][T32407] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2855.775168][T32407] RIP: 0033:0x7f4243ed90d9 [ 2855.779421][T32407] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2855.798862][T32407] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2855.807107][T32407] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2855.814919][T32407] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2855.822728][T32407] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2855.830544][T32407] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2855.838350][T32407] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 07:42:04 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 54) 07:42:04 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000620000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:04 executing program 0: write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) 07:42:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1, 0x30, 0xd6, 0xfa, 0x0, 0x7, 0x40040, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x2004, 0x2, 0x50, 0x6, 0x1, 0x8, 0x76, 0x0, 0x3ff, 0x0, 0xfff}, 0x0, 0xa, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r3) 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x9, 0x10, 0x0}, 0x80) 07:42:04 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x1, &(0x7f0000000080)=@raw=[@ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)=""/98, 0x62}, {&(0x7f00000001c0)=""/159, 0x9f}], 0x2}, 0x40000000) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000480)=""/4096) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.time\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000300)={0x0, 0x4, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}, @random="3e04794a97b5", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="26274c43c937"]}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x1, &(0x7f0000000080)=@raw=[@ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)=""/98, 0x62}, {&(0x7f00000001c0)=""/159, 0x9f}], 0x2}, 0x40000000) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000480)=""/4096) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.time\x00', 0x0, 0x0) (async) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000300)={0x0, 0x4, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}, @random="3e04794a97b5", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="26274c43c937"]}) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) 07:42:04 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000630000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:04 executing program 0: write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) [ 2855.846163][T32407] [ 2855.862664][T32436] FAULT_INJECTION: forcing a failure. [ 2855.862664][T32436] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2855.882202][T32436] CPU: 1 PID: 32436 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xa, 0x10, 0x0}, 0x80) 07:42:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1, 0x30, 0xd6, 0xfa, 0x0, 0x7, 0x40040, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x2004, 0x2, 0x50, 0x6, 0x1, 0x8, 0x76, 0x0, 0x3ff, 0x0, 0xfff}, 0x0, 0xa, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r3) 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xb, 0x10, 0x0}, 0x80) 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xc, 0x10, 0x0}, 0x80) [ 2855.892262][T32436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2855.902160][T32436] Call Trace: [ 2855.905280][T32436] [ 2855.908064][T32436] dump_stack_lvl+0x151/0x1b7 [ 2855.912576][T32436] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2855.917871][T32436] dump_stack+0x15/0x17 [ 2855.921861][T32436] should_fail+0x3c0/0x510 [ 2855.926115][T32436] should_fail_alloc_page+0x58/0x70 [ 2855.931142][T32436] __alloc_pages+0x1de/0x7c0 [ 2855.935573][T32436] ? __count_vm_events+0x30/0x30 [ 2855.940345][T32436] ? __this_cpu_preempt_check+0x13/0x20 [ 2855.945728][T32436] ? __mod_node_page_state+0xac/0xf0 [ 2855.950848][T32436] pte_alloc_one+0x73/0x1b0 [ 2855.955186][T32436] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2855.960222][T32436] __pte_alloc+0x86/0x350 [ 2855.964387][T32436] ? free_pgtables+0x210/0x210 [ 2855.968987][T32436] ? _raw_spin_lock+0xa3/0x1b0 [ 2855.973586][T32436] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2855.978798][T32436] ? __kernel_text_address+0x9a/0x110 [ 2855.984002][T32436] copy_pte_range+0x1b1f/0x20b0 [ 2855.988692][T32436] ? __kunmap_atomic+0x80/0x80 [ 2855.993285][T32436] ? __kasan_slab_alloc+0xc4/0xe0 [ 2855.998145][T32436] ? __kasan_slab_alloc+0xb2/0xe0 [ 2856.003004][T32436] ? kmem_cache_alloc+0x189/0x2f0 [ 2856.007863][T32436] ? vm_area_dup+0x26/0x1d0 [ 2856.012202][T32436] ? dup_mmap+0x6b8/0xea0 [ 2856.016370][T32436] ? dup_mm+0x91/0x330 [ 2856.020276][T32436] ? copy_mm+0x108/0x1b0 [ 2856.024354][T32436] ? copy_process+0x1295/0x3250 [ 2856.029041][T32436] ? kernel_clone+0x22d/0x990 [ 2856.033556][T32436] ? __x64_sys_clone+0x289/0x310 [ 2856.038331][T32436] ? do_syscall_64+0x44/0xd0 [ 2856.042756][T32436] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2856.048660][T32436] copy_page_range+0xc1e/0x1090 [ 2856.053346][T32436] ? pfn_valid+0x1e0/0x1e0 [ 2856.057598][T32436] dup_mmap+0x99f/0xea0 [ 2856.061591][T32436] ? __delayed_free_task+0x20/0x20 [ 2856.066536][T32436] ? mm_init+0x807/0x960 [ 2856.070614][T32436] dup_mm+0x91/0x330 [ 2856.074347][T32436] copy_mm+0x108/0x1b0 [ 2856.078252][T32436] copy_process+0x1295/0x3250 [ 2856.082766][T32436] ? proc_fail_nth_write+0x213/0x290 [ 2856.087886][T32436] ? proc_fail_nth_read+0x220/0x220 [ 2856.092922][T32436] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2856.097870][T32436] ? vfs_write+0x9af/0x1050 [ 2856.102204][T32436] ? vmacache_update+0xb7/0x120 [ 2856.106896][T32436] kernel_clone+0x22d/0x990 [ 2856.111232][T32436] ? file_end_write+0x1b0/0x1b0 [ 2856.115920][T32436] ? __kasan_check_write+0x14/0x20 [ 2856.120865][T32436] ? create_io_thread+0x1e0/0x1e0 [ 2856.125730][T32436] ? __mutex_lock_slowpath+0x10/0x10 [ 2856.130848][T32436] __x64_sys_clone+0x289/0x310 [ 2856.135449][T32436] ? __do_sys_vfork+0x130/0x130 [ 2856.140134][T32436] ? debug_smp_processor_id+0x17/0x20 [ 2856.145343][T32436] do_syscall_64+0x44/0xd0 [ 2856.149595][T32436] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2856.155322][T32436] RIP: 0033:0x7f4243ed90d9 [ 2856.159577][T32436] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2856.179017][T32436] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2856.187262][T32436] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 07:42:04 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 55) 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xd, 0x10, 0x0}, 0x80) 07:42:04 executing program 0: write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) 07:42:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1, 0x30, 0xd6, 0xfa, 0x0, 0x7, 0x40040, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x2004, 0x2, 0x50, 0x6, 0x1, 0x8, 0x76, 0x0, 0x3ff, 0x0, 0xfff}, 0x0, 0xa, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) close(r3) 07:42:04 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000680000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:04 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x1, &(0x7f0000000080)=@raw=[@ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)=""/98, 0x62}, {&(0x7f00000001c0)=""/159, 0x9f}], 0x2}, 0x40000000) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000480)=""/4096) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.time\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000300)={0x0, 0x4, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}, @random="3e04794a97b5", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="26274c43c937"]}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x1, &(0x7f0000000080)=@raw=[@ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)=""/98, 0x62}, {&(0x7f00000001c0)=""/159, 0x9f}], 0x2}, 0x40000000) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000480)=""/4096) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.time\x00', 0x0, 0x0) (async) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000300)={0x0, 0x4, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}, @random="3e04794a97b5", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="26274c43c937"]}) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80) 07:42:04 executing program 0: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)={0x2, 0x0, [0x0, 0x0]}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x416cc0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'geneve0\x00', 0x600}) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x6, 0x89, 0x0, 0x0, 0x0, 0x1e4, 0x0, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xf4, 0x2, @perf_bp={&(0x7f0000000300), 0x9}, 0x189, 0x3f, 0x8, 0x1, 0xfffffffffffffffa, 0x6, 0x6, 0x0, 0x6, 0x0, 0xfffffffffefffffe}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) recvmsg$unix(r2, &(0x7f00000002c0)={&(0x7f0000000100), 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)=""/246, 0xf6}], 0x1}, 0x100) 07:42:04 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000690000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x10, 0x10, 0x0}, 0x80) [ 2856.195072][T32436] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2856.202882][T32436] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2856.210696][T32436] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2856.218508][T32436] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2856.226321][T32436] 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x11, 0x10, 0x0}, 0x80) 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x12, 0x10, 0x0}, 0x80) [ 2856.263199][T32483] FAULT_INJECTION: forcing a failure. [ 2856.263199][T32483] name failslab, interval 1, probability 0, space 0, times 0 [ 2856.306534][T32483] CPU: 0 PID: 32483 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2856.316611][T32483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2856.326500][T32483] Call Trace: [ 2856.329623][T32483] [ 2856.332399][T32483] dump_stack_lvl+0x151/0x1b7 [ 2856.336915][T32483] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2856.342209][T32483] dump_stack+0x15/0x17 [ 2856.346201][T32483] should_fail+0x3c0/0x510 [ 2856.350454][T32483] __should_failslab+0x9f/0xe0 [ 2856.355053][T32483] should_failslab+0x9/0x20 [ 2856.359393][T32483] kmem_cache_alloc+0x4f/0x2f0 [ 2856.363992][T32483] ? vm_area_dup+0x26/0x1d0 [ 2856.368334][T32483] vm_area_dup+0x26/0x1d0 [ 2856.372499][T32483] dup_mmap+0x6b8/0xea0 [ 2856.376490][T32483] ? __delayed_free_task+0x20/0x20 [ 2856.381437][T32483] ? mm_init+0x807/0x960 [ 2856.385516][T32483] dup_mm+0x91/0x330 [ 2856.389247][T32483] copy_mm+0x108/0x1b0 [ 2856.393154][T32483] copy_process+0x1295/0x3250 [ 2856.397670][T32483] ? proc_fail_nth_write+0x213/0x290 [ 2856.402788][T32483] ? proc_fail_nth_read+0x220/0x220 [ 2856.407823][T32483] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2856.412768][T32483] ? vfs_write+0x9af/0x1050 [ 2856.417108][T32483] ? vmacache_update+0xb7/0x120 [ 2856.421798][T32483] kernel_clone+0x22d/0x990 [ 2856.426136][T32483] ? file_end_write+0x1b0/0x1b0 [ 2856.430820][T32483] ? __kasan_check_write+0x14/0x20 [ 2856.435770][T32483] ? create_io_thread+0x1e0/0x1e0 [ 2856.440631][T32483] ? __mutex_lock_slowpath+0x10/0x10 [ 2856.445755][T32483] __x64_sys_clone+0x289/0x310 [ 2856.450349][T32483] ? __do_sys_vfork+0x130/0x130 [ 2856.455037][T32483] ? debug_smp_processor_id+0x17/0x20 [ 2856.460243][T32483] do_syscall_64+0x44/0xd0 [ 2856.464500][T32483] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2856.470225][T32483] RIP: 0033:0x7f4243ed90d9 [ 2856.474482][T32483] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2856.493921][T32483] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 07:42:04 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 56) 07:42:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000180)='./file0\x00'}, 0x10) close(r0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.numa_stat\x00', 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='objagg_obj_create\x00', r2}, 0x10) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x80, 0x80, 0x3, 0x1f, 0x5f, 0x0, 0x49903d54, 0x8200, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x200, 0x9}, 0xb92, 0x0, 0x3ff, 0x7, 0x0, 0x7, 0x80, 0x0, 0xffffffff, 0x0, 0x9}, r2, 0x2, r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={0xffffffffffffffff}, 0x4) r7 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0x25, 0x5, 0xfc, 0x0, 0x2000000000000ff, 0xc, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000100), 0xe}, 0x84000, 0xa, 0x6, 0x8, 0x1f, 0xffff, 0x1, 0x0, 0x10004, 0x0, 0x1}, 0xffffffffffffffff, 0x10, r6, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) openat$cgroup(r6, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x18, 0x10, 0x0}, 0x80) 07:42:04 executing program 0: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)={0x2, 0x0, [0x0, 0x0]}) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x416cc0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'geneve0\x00', 0x600}) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x6, 0x89, 0x0, 0x0, 0x0, 0x1e4, 0x0, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xf4, 0x2, @perf_bp={&(0x7f0000000300), 0x9}, 0x189, 0x3f, 0x8, 0x1, 0xfffffffffffffffa, 0x6, 0x6, 0x0, 0x6, 0x0, 0xfffffffffefffffe}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) (async, rerun: 64) recvmsg$unix(r2, &(0x7f00000002c0)={&(0x7f0000000100), 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)=""/246, 0xf6}], 0x1}, 0x100) (rerun: 64) 07:42:04 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000006a0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.numa_stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r2}, 0x8) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000040), 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000080), 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r5, r5, 0xffffffffffffffff, r5, r5, r5, r5, r5, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r6, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r6, r7, 0x1f}, 0x10) [ 2856.502164][T32483] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2856.509974][T32483] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2856.517785][T32483] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2856.525599][T32483] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2856.533410][T32483] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2856.541222][T32483] 07:42:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000180)='./file0\x00'}, 0x10) (async) close(r0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.numa_stat\x00', 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='objagg_obj_create\x00', r2}, 0x10) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x80, 0x80, 0x3, 0x1f, 0x5f, 0x0, 0x49903d54, 0x8200, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x200, 0x9}, 0xb92, 0x0, 0x3ff, 0x7, 0x0, 0x7, 0x80, 0x0, 0xffffffff, 0x0, 0x9}, r2, 0x2, r3, 0x4) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={0xffffffffffffffff}, 0x4) (async) r7 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0x25, 0x5, 0xfc, 0x0, 0x2000000000000ff, 0xc, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000100), 0xe}, 0x84000, 0xa, 0x6, 0x8, 0x1f, 0xffff, 0x1, 0x0, 0x10004, 0x0, 0x1}, 0xffffffffffffffff, 0x10, r6, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) openat$cgroup(r6, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 07:42:04 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000006b0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:04 executing program 0: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)={0x2, 0x0, [0x0, 0x0]}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x416cc0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'geneve0\x00', 0x600}) (async, rerun: 64) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) (rerun: 64) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x6, 0x89, 0x0, 0x0, 0x0, 0x1e4, 0x0, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xf4, 0x2, @perf_bp={&(0x7f0000000300), 0x9}, 0x189, 0x3f, 0x8, 0x1, 0xfffffffffffffffa, 0x6, 0x6, 0x0, 0x6, 0x0, 0xfffffffffefffffe}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) (async, rerun: 64) recvmsg$unix(r2, &(0x7f00000002c0)={&(0x7f0000000100), 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)=""/246, 0xf6}], 0x1}, 0x100) (rerun: 64) 07:42:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x25, 0x10, 0x0}, 0x80) [ 2856.570182][T32503] FAULT_INJECTION: forcing a failure. [ 2856.570182][T32503] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2856.591955][T32503] CPU: 0 PID: 32503 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2856.602016][T32503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2856.611911][T32503] Call Trace: [ 2856.615036][T32503] 07:42:05 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000087c0104000060f09d8609df0400000800e0ff00c8929cca00000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:05 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000006c0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2856.617814][T32503] dump_stack_lvl+0x151/0x1b7 [ 2856.622325][T32503] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2856.627628][T32503] dump_stack+0x15/0x17 [ 2856.631615][T32503] should_fail+0x3c0/0x510 [ 2856.635876][T32503] should_fail_alloc_page+0x58/0x70 [ 2856.640901][T32503] __alloc_pages+0x1de/0x7c0 [ 2856.645326][T32503] ? __count_vm_events+0x30/0x30 [ 2856.650100][T32503] ? __this_cpu_preempt_check+0x13/0x20 [ 2856.655479][T32503] ? __mod_node_page_state+0xac/0xf0 [ 2856.660602][T32503] pte_alloc_one+0x73/0x1b0 [ 2856.664942][T32503] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2856.669978][T32503] __pte_alloc+0x86/0x350 [ 2856.674140][T32503] ? free_pgtables+0x210/0x210 [ 2856.678739][T32503] ? _raw_spin_lock+0xa3/0x1b0 [ 2856.683341][T32503] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2856.688549][T32503] ? __kernel_text_address+0x9a/0x110 [ 2856.693752][T32503] copy_pte_range+0x1b1f/0x20b0 [ 2856.698441][T32503] ? __kunmap_atomic+0x80/0x80 [ 2856.703037][T32503] ? __kasan_slab_alloc+0xc4/0xe0 [ 2856.707897][T32503] ? __kasan_slab_alloc+0xb2/0xe0 [ 2856.712758][T32503] ? kmem_cache_alloc+0x189/0x2f0 [ 2856.717621][T32503] ? vm_area_dup+0x26/0x1d0 [ 2856.721959][T32503] ? dup_mmap+0x6b8/0xea0 [ 2856.726122][T32503] ? dup_mm+0x91/0x330 [ 2856.730027][T32503] ? copy_mm+0x108/0x1b0 [ 2856.734106][T32503] ? copy_process+0x1295/0x3250 [ 2856.738796][T32503] ? kernel_clone+0x22d/0x990 [ 2856.743310][T32503] ? __x64_sys_clone+0x289/0x310 [ 2856.748082][T32503] ? do_syscall_64+0x44/0xd0 [ 2856.752506][T32503] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2856.758413][T32503] copy_page_range+0xc1e/0x1090 [ 2856.763100][T32503] ? pfn_valid+0x1e0/0x1e0 [ 2856.767350][T32503] dup_mmap+0x99f/0xea0 [ 2856.771342][T32503] ? __delayed_free_task+0x20/0x20 [ 2856.776291][T32503] ? mm_init+0x807/0x960 [ 2856.780367][T32503] dup_mm+0x91/0x330 [ 2856.784105][T32503] copy_mm+0x108/0x1b0 [ 2856.788007][T32503] copy_process+0x1295/0x3250 [ 2856.792520][T32503] ? proc_fail_nth_write+0x213/0x290 [ 2856.797641][T32503] ? proc_fail_nth_read+0x220/0x220 [ 2856.802675][T32503] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2856.807622][T32503] ? vfs_write+0x9af/0x1050 [ 2856.811960][T32503] ? vmacache_update+0xb7/0x120 [ 2856.816649][T32503] kernel_clone+0x22d/0x990 [ 2856.820985][T32503] ? file_end_write+0x1b0/0x1b0 [ 2856.825673][T32503] ? __kasan_check_write+0x14/0x20 [ 2856.830621][T32503] ? create_io_thread+0x1e0/0x1e0 [ 2856.835480][T32503] ? __mutex_lock_slowpath+0x10/0x10 [ 2856.840603][T32503] __x64_sys_clone+0x289/0x310 [ 2856.845202][T32503] ? __do_sys_vfork+0x130/0x130 [ 2856.849888][T32503] ? debug_smp_processor_id+0x17/0x20 [ 2856.855096][T32503] do_syscall_64+0x44/0xd0 [ 2856.859349][T32503] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2856.865076][T32503] RIP: 0033:0x7f4243ed90d9 [ 2856.869332][T32503] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2856.888774][T32503] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2856.897015][T32503] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2856.904826][T32503] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2856.912639][T32503] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:42:05 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 57) 07:42:05 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x48, 0x10, 0x0}, 0x80) 07:42:05 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async, rerun: 64) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x0, 0x0) (rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000087c0104000060f09d8609df0400000800e0ff00c8929cca00000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:05 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000710000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000180)='./file0\x00'}, 0x10) close(r0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.numa_stat\x00', 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='objagg_obj_create\x00', r2}, 0x10) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x80, 0x80, 0x3, 0x1f, 0x5f, 0x0, 0x49903d54, 0x8200, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x200, 0x9}, 0xb92, 0x0, 0x3ff, 0x7, 0x0, 0x7, 0x80, 0x0, 0xffffffff, 0x0, 0x9}, r2, 0x2, r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={0xffffffffffffffff}, 0x4) r7 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0x25, 0x5, 0xfc, 0x0, 0x2000000000000ff, 0xc, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000100), 0xe}, 0x84000, 0xa, 0x6, 0x8, 0x1f, 0xffff, 0x1, 0x0, 0x10004, 0x0, 0x1}, 0xffffffffffffffff, 0x10, r6, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) openat$cgroup(r6, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000180)='./file0\x00'}, 0x10) (async) close(r0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.numa_stat\x00', 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='objagg_obj_create\x00', r2}, 0x10) (async) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x80, 0x80, 0x3, 0x1f, 0x5f, 0x0, 0x49903d54, 0x8200, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x200, 0x9}, 0xb92, 0x0, 0x3ff, 0x7, 0x0, 0x7, 0x80, 0x0, 0xffffffff, 0x0, 0x9}, r2, 0x2, r3, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={0xffffffffffffffff}, 0x4) (async) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0x25, 0x5, 0xfc, 0x0, 0x2000000000000ff, 0xc, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000100), 0xe}, 0x84000, 0xa, 0x6, 0x8, 0x1f, 0xffff, 0x1, 0x0, 0x10004, 0x0, 0x1}, 0xffffffffffffffff, 0x10, r6, 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) (async) openat$cgroup(r6, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) 07:42:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.numa_stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r2}, 0x8) (async, rerun: 64) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) (rerun: 64) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000040), 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async, rerun: 32) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 32) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r5, r5, 0xffffffffffffffff, r5, r5, r5, r5, r5, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r6, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async, rerun: 64) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (rerun: 64) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r6, r7, 0x1f}, 0x10) 07:42:05 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000720000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:05 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c, 0x10, 0x0}, 0x80) 07:42:05 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000087c0104000060f09d8609df0400000800e0ff00c8929cca00000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) write$cgroup_pressure(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000087c0104000060f09d8609df0400000800e0ff00c8929cca00000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) [ 2856.920450][T32503] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2856.928259][T32503] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2856.936074][T32503] 07:42:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000480)={&(0x7f00000002c0)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000300)="1f", 0x1}, {&(0x7f0000000380)='t', 0x1}, {0x0}], 0x3, &(0x7f0000000440)="0b2533ba3211a0a1c6ed2b556fcbf229fc72ebb3e8b15320ceec3efb77d9ee23375910d8b9", 0x25}, 0x0) sendmsg$tipc(r2, &(0x7f0000000740)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x4, 0x4}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000100)="3dd221b7c11286af0bad5bf0f9b05394cb66b503dee0bcf8440d0a8af360bd3099e3e576f57e7a1b4483a2c53d079bbe97bd48860431b1b8b2efe15787264c91b0b0db7363a188831fd711a95d2eb07ea199cb49a839886dabc20c230b9d1b51e0657e18f7d264751fabcb1fd6e5ada33e2ed3b7cb33c306789532ba346e87a6ada4e1f7c6038afd894bacaeb28de11bf25b99f83451fa", 0x97}, {&(0x7f00000001c0)="e7de2d2d5ab666891547b6b17acc6a2ffea1bf", 0x13}, {&(0x7f0000000200)="8f3a24011fd981eaf0b76c1fc30de1c3a9be5aeb83faa5d06d5709b32c2806b37336d8b4af1b84650ecb085c301e31f5b21ffc8234573eb0d5c5a85af5ad38a2a152c871b61ae8c8eab105b661b99e018e4be8ddc95d2980572508a29adfff5a5a2131850b40e91c691990b428d3f01cd5237da5e00442ba530e773ec673680d8716e2ca89a4859b590d286dedb4e263b1049ad4169b4d7049206b0a3ded51df981fdd0f8341686e4ee67d567b22a84719ea7bb12b4c5d3468e60bd29270846ca9a760bd2d4d8f38521a85ce0340289c9ca22b563e403d3993d9dc3aa0b58dfec5", 0xe1}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000000300)="4a79d8076b90013d8bfd6980b767fd353358e4e3cabbd477ef88a2f198bda24734b69b63641c2fcf1fd35c0ac218c6c9ab9e965f1bbc57a2e299b1a435f9c99c705afefefca6c3936a3897748e523f023140e159fbbecc874d2249d69e67431c4da622492d62ab1b78e0cf96132064a8e603d657a6e8b54eb3a6a3501600aa12406cb0f6af10ed3051f94b720a800c03bc7fbb2055911944db0b60141d75d4e2afeec9ef6b8290017a339e19c4f943f71e748f5506c0a57455b4345b7fe73d89a72349f2c7b78dd3", 0xc8}, {&(0x7f0000000400)="ef1757907af6397190ae644e74437b4eb7eb1f22acfff38a83af40be40a234a01f092a1a38091b42443f11d8d93e9755be9a09d9f319bc8137c8f5032a6d2977d9e01954047106e00fbe5bef35abbd6e31d37f1a8b9043d06582528facdd28aa7daa2aeaef330afdd39c", 0x6a}, {&(0x7f0000000480)="67639a55edd337c10d0ee9cc2ae620039ae4c3cff8c4", 0x16}, {&(0x7f00000004c0)="c56bae40ace29f96b4b3cbb69a44cdadf84ed089a8f3138330bf76da282354304dde43e8fb4844e6795715e120c6760f804cc534022a052786e4482047527b8d9a073d983555dbd6cf08561bc0a38884fe54e499417a203220a48cd8109595203aa90f72251c06e97083c2b87c1a13c61773f8", 0x73}, {&(0x7f0000000540)="5410793dfb4021a888f245", 0xb}], 0x9, &(0x7f0000000640)="d86e52963975cbbf98e954fb2c763f5df53b5b6a1993a6a4114bf9568716619d6a75605da97a3b35dc086297c12e59c6cf64b7a81ff6d690386731a2bbbb759cd2a9577efbbcf20f0ec164b71b1073afd6818e19305c35de06b97dedd0f493e87746fc5879b34c37caf97eff40f5c1b7c16fa4dea2e90d2d394fe8be36a5c3b40eb98cfff87b14f28dabdf4cccd73e41ea6d9c00346b33b4d0782592db188c5d20e29b252158347c6f580accb0425f17ca681842841a2ea7e97215a6df68828ca5", 0xc1, 0x4044}, 0x8900) close(r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)='bridge0\x00'}, 0x30) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000000)=0xfffffffe) close(r0) 07:42:05 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000730000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000480)={&(0x7f00000002c0)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000300)="1f", 0x1}, {&(0x7f0000000380)='t', 0x1}, {0x0}], 0x3, &(0x7f0000000440)="0b2533ba3211a0a1c6ed2b556fcbf229fc72ebb3e8b15320ceec3efb77d9ee23375910d8b9", 0x25}, 0x0) sendmsg$tipc(r2, &(0x7f0000000740)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x4, 0x4}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000100)="3dd221b7c11286af0bad5bf0f9b05394cb66b503dee0bcf8440d0a8af360bd3099e3e576f57e7a1b4483a2c53d079bbe97bd48860431b1b8b2efe15787264c91b0b0db7363a188831fd711a95d2eb07ea199cb49a839886dabc20c230b9d1b51e0657e18f7d264751fabcb1fd6e5ada33e2ed3b7cb33c306789532ba346e87a6ada4e1f7c6038afd894bacaeb28de11bf25b99f83451fa", 0x97}, {&(0x7f00000001c0)="e7de2d2d5ab666891547b6b17acc6a2ffea1bf", 0x13}, {&(0x7f0000000200)="8f3a24011fd981eaf0b76c1fc30de1c3a9be5aeb83faa5d06d5709b32c2806b37336d8b4af1b84650ecb085c301e31f5b21ffc8234573eb0d5c5a85af5ad38a2a152c871b61ae8c8eab105b661b99e018e4be8ddc95d2980572508a29adfff5a5a2131850b40e91c691990b428d3f01cd5237da5e00442ba530e773ec673680d8716e2ca89a4859b590d286dedb4e263b1049ad4169b4d7049206b0a3ded51df981fdd0f8341686e4ee67d567b22a84719ea7bb12b4c5d3468e60bd29270846ca9a760bd2d4d8f38521a85ce0340289c9ca22b563e403d3993d9dc3aa0b58dfec5", 0xe1}, {&(0x7f0000000b00)="15c95a13c2c093c7c94426505ea9b6c39cb6911a0d3f19b79421d0ad062fc928ef959e1c6923e65873382f0efd15b36321362791574521ef3b582c7670a3ea616cd5b043d1f928b2ccb309f9594e1164196d25dc30e9dc20fb6693572df59831e4279825120109939465760f19eb51c7674bdcb5e789b158154059fac4ee88fa5d0b9d3ed52f1141cfc92dc478ff5b2c1c250aef654b14caa3ead85437767908bbae80aa7a55df4bf183fa0a0097b7fee0704a430f777c1f7c46312e648311dba2a4968a3f7a29438b8c848fb2bad69e220af1731ca9d67707cfb673aecfee5a92e845a1427371ff3350a11d508f1d553ca769d3bbf4e0c2d59fffbf5ae4282f87eff8f02974306361ec473dafa1f857199d4d7aead36af1f57ac3c8e929f35efd24233cdc19622555b072b0138548c1fb530bbec73442bc3d21dc6e3dd1cc7e96e43da0278aff565ec3ffd91b529bb065f6d33a8e7da7da3faecffc55f24746b513b187f018c80a4e561cfae1423c4fe35ef4025511a3c960e146054a3eed70a1e936cc6c53a87566f60302b91eda0cf402db0a96dfe23e6ad67ca1fa51b40b47a18b19ba6ea744e9d4e08a7434f9ae60fa5f567023afd5f829259c5cc8096d19c83934f4152dded91a47c0794c61da38cc24edaf471cc3238ae6deb0e43fe1de0b275a8dad5dff4bf7eb8c972b75cf5ed4a298b0b9b238739b5e2933335aa6f9c143c2e1e361ce76b802b1c4f4b93fcad5604211947f6e51b3ccdf5c8cb07c98810c9b60682ae6139dc2ddb364db1faa5a598c23e7ebf596d91c1c587342750e8a8b5dd94d0245fd66be791069270bbfd41ed07903c59f0cebc1c55d0fcab07ac00995fa2244711e66fe2da60bb6e4fc472dbec70acf5d2c1e032329aa6a2be5827a5d263b6a170290f0441afda20ea6c87b8d118e43e4ce936d74a6a37f46e1a545ac04be91aff173d0d6ef0cb5cd786d7ebb02978ea3ab7d2c0e7f0d66ddd6f91f72587ab6443a6f393f88ad8f71b9f57e20bda66e431e32140baf0247bee5d60afa1cc089ec8c504e5edd0c105c07e9fa8ca5a27701ea244c23021034307ddf7f1dee8f05a3bb6da55ec0eb313a174304523a5e03de14a8e66634d5cf5ce3615fa0bc3ad80afad5427f9a332bd3868af5294437e032b5ca1170aca1be6d07effb9bff94e71f4637f66dac75c87e1d775e4752b90fd8e4fd26185e3999affbb7c54745a967278b532871665666e44dc83af469641339ece22fe8579969b30920830ad82930250d9fcf16a9716b657ef040429268f8a738dfff2e15e77c39f3e469a21810e5a1a7ce6c88c64154e43db4dfd429ab99d05dc07025c837526be12af46fd3cba1dcf9c8770e50bc5c4a3ccafc7484fb4317268174837e751e305aefc1eb74661cd43a2234cd29890f3bc1c1e0a0d9fffef3c309f149af921758fd9202b4fa4de661d5caafc157fcbf952add36f0409d65fecde10a0226c9594a035077f967673cdcf85b6960b396af0829084f0ee7d9fdfb94e0b4f363d91509deade482d6a2362b2aa056a89c21701d41a988ab55b1cc5abaa4602aa0061cc240603a3f2ab4878690e6aeea0c187864845bfad6dcc417b8da583385fd17d2ff6659639a5c944a27d7aebfe24d32b8140e62aca6f2c41fc6ff2abc278aebe77af00a4e198f94adf50df65810983df23b0e12b4e2a5deaff18c6993ca9791f1cfa4464ad9f66e1db8375cee17317f1b4fb20ee9bc79a328cefbfceca0b9bbe841ccb62822b0ee1246a716c68f802183c5f9d57dd27ab74aeb67a796db71a9cff1e0076de55f6aaef06794dfe155655f90c57b4d054c89f092de02d82fcebeda958e4a508e6af7e2a06d062192b0b63a123f817135a0d6ab5b0f0d671863fa5595de33026bcf70c68a4be33f92ff74361cf3d93a89244ea3205076c359b9d051eefdc1c6763b5b5488c860022115d240330644b3749e2e929c2f774de3bfdb755cc5e3fbb711b4cf128e1dd7cdb828ea58895b83a8d23cc600f2e91f6b830c9fc00309fdac3bd9e365fef698689d536a04f24e51a0d39f6d92f2340fb74931ecedf3d359f98b0d053b44b5daf920fe753f98df3bb33e0aa7099a664445b19b32246f3619c1e5a9c8366dca139512252167320cf9ba8aa8954b25a745db77fc5a77a9627796e35f59f2b9d4305d1cc68d0ca5bfdb9790f93b0cb1d7baa818a8d040babaea20d1ed65ea5a551029eb2a08165f8abfd48aae0e0821e2899f07cee79502016ce59cbcaae57d44db91a272361657bfd4db6ace6489943d2dee2417cc33aef68d34d70baf79eb00371b5678667ccb33b10713a0592269d26329eb6e1c43847d3e1bdcdb0b8bf899d701796fe49e6414f2e3900eaf63f242103aa7cd32c9066ede594b0968f0a04991bb8df429e1698bb5535d07349d095f20386eba15aa642d8e7c545a26fd79a01e1bcfc2957049edaa35bea3c5e094773ad811f2fedc99fb7a974789317fb8594892786aaf41871cdd0b85046fc76029f29d80f9a011718026884e389ea3427eb7dd18693868895d441d749251e65b4c9ec8ee0e963253ef99d205aeb17268a0efeb2734f8834fa47664c4fabc61e747f6cae5d46cd4cd88ac6fc29cf5b61fe7710ac08b93e06a80d4e79de6a8128c131f4d3a7263161ec5a4344619bfcb1d741e835484a792affcfcdabdc89e8d7bc42f05d9300ef4c61cc21bfef640c6288b6413df26815cc5f5b3def187361a985fb23bfbcf05c3d26680c2545699fb4732d50fafdde926a240f803a8ee2ab96764a24b8cdfe227a23001f1aeb28ffcfe0b80360aaeed1bee18a22caae6f75675c683def7441f5b5444a4bbea8db554fd6b45f301fb4b88371ca44cd40d892368d7c5cc9e172ab34a85c818e5686a6ebdf89290f0eafe9260c221f928bcca90d75136000f05572b3ce357d02a7ace959b3546bfc7644d2e118fa3d7dcadb74cd9ade5a0865a5968ba68655c0d8c30292cfadc08ef063b9ee1c642371858e81a5d64c3e9071b023c42e217b746f7d961e6bd713c13c77f09d6f95c352d812570a3d71c372b25c4624d9a1dcdc823b2f9e38cee1b30e2476e7e85f04cca0cfe62a9b22b6ce2c6bb845d32db4f9b9b6db35e74f054ae31e65c82a742eb90b8e02d397521f9277c11981c3075cf0f576715b99e80f8c4f25bae5a5437159108d4f9cf61346ba527f272992c337f08b572efef4cc7fd4ddbe38370472835ca99f1a8960da6ecc033c451f71676ef553dfe296cfa9352c1c8f9933e00d82620190673cdde31004a069563c0ee3f75544eb94331f66d06c3a476a018e7191674f05a620dd60d58b1c541e62a8c26eb600e2d6fa522405d0a369be0849773ea617d5491531f985d028f18ac1f084f916fb6fb2a991442dc523f848c9a87ff8b4997dd34ae84855f4aaafad3f96fcc62e3dff48e1092c3446c24a81306c4fee1c884859940d956d3ef9cb614f62bf5b2e9bfc21d4a1bbdecf775a725053119793643adfac77dc12ac61248042127db88044f83fda258f8757dcf0ec095190a3298ade5e3dae8a45a29d2e722ca1d6f350bd2cefd85337514912784b7674c0b24073fcf0a4ea188c3cc539eb5eaf0097c8b649539db6c1d55c9aa5a6791ef1a1ede7ff6658e0f462032a4ef9cc440f187d8b015047e4d143caf3821837b621bea5c4ba52f0ab5d4644be200cbe5bda303a32a4457ce52c90e53fd4e7902ced8fbf8e93295476befde7534e9e6654db05953cbeb128ae5af89480022786f4102784d3946d37cd01551e2a96ac16ff1582a06172d796af4444cc498d80c629d47a80f9b2bce3cf632499fc68c627c6c200c6ef9aeb1941ce245d92b3b98db38620d0ad1da1f820e04c407fab2ea081ce960700fa494b738b9d5f2461b1ffd7e5c090a2ac026d5be8f249a42315c5bb2e7d2564aa6c870c804d43c704166a8bb6a3a420a3577b0b09f57db4dabe2e9439ca6c074f32e7f3ff636f5b2af215c2cdc9a356c91ceaefc6544d2da43779707bf29764695b0040e080a138e5349f0fb56838fadaae466b3b9b964a1aabbb0aee1249fce3a947cd2b221402e6570120df26e9d95d3db64743e8a42184e458f78be2e38f7139f90dabeb0a66ec827e73e73d072593eb9f0bce6f98fdd64e266afb756c7077d78c9e9d6d8f6584a83a88808cc1a607a3b4f784cf612067e03988988a8b73c0ad1f07c543c7f3ba711faf057828ac28a01d02d7ae5d4f2d75ba12bc9d1c406fc7434c4ea56048c864c7108a833f84d4452193c98047fed19158fcae040e8feb9d1b89803fc48435638205a94af56dbe4e7a2c69cf371f38537919d6d53f904287f926d9c97cd8273b01402bdd2e96e6ebaab406abd483eb7d14838b5e1eab8693326a672e313e09bd890a13957d75b296f98a86832ddfab01e67603162565eaa2f18dbc84be1e8581208bbd3e9636fd9893604957f74dfe350601c8a7ed232ceae4782ca08349c7fe034aa979cad2f5ca1aed6faf055950b8c68d9c54c80885ebd0605f89532b161df44829913a26c36882d9d4d21baf6232f414c8cabf65eb7488d1986a0f3607f81d170848191e9d2513ce05bca7169220c5faa49aa4d76d415e780b6c3e6f66a479ca3a4170b0bda78444916cc006e4df63eca32ae4b25c7ae475d895d9c58f97bb2d773f0db13cdf5c8ebe2a3c3d5a6d2a5416602a8058d7904840c761eac8b6170f3ab7825d424aa8d9632a4917f6c7bcdfd622de28e0226f365155d03645db54fa541bf0babdf3ff2b6ca0c26453df68a777390a27e2499389c7da4a21e6059d9d19a746c8bd65adfb832a3988cca4255a461935d569d58c92c3a8a322400407c3cb7bfeb64007cabadc69ce2771417e7f4d30de242df60b0b7e10e7ea8dffb88be5c55f92a6dc571c0bf5d36dc6c118e26a638e2dd00b25adfbf8e4f2066363d34ba2941ca391cbdcca3c9b941a60efa909fbd78a588632cfa9101383a90094bd27bbc048c2fc5d2cd7946a04ad9d1f653f96b1e8983a4611a210c254af2f67f46964c0ec561162694539b631b5b92053a7f2a2de5e5be721c2762de6ae6a0c3fcc4f1c533075da67e69e168f6082c8c3ac56f7f2248586f78ed363018ccde8375305b7b26e11b638c6a954a1d79ed7f30e529bec47c98d7f6b313507c7e5e501e27ca6c8665c760d590ee972856f1f747259479950a68c87c4fff260c3dde4513764b01cc11499933ea82c8e9f54978311da178549827231d90da7d7d4fa4b8214bab690cb2780919e9be082ec6465bba21b3b3a45a85a0390ca0458fee74cd610f09a8bc6637b6ef5f346d3271c753c7b38d5b0f78809f88d4d8663921dbb8922c4cecd547373927eae69743c6f9e2111efb44634a36cacb63acf701291e538f679cd75411b041af3bdc03497a33420bf28dabc60dee30ad3546fbe29d2d0389bc1013ff37219ecde699cb0177464a0da612679949eedd5c414fd8d23ea5cf3051d07a5a9a8ca18644eea57d0f0ba9b5237b8042d42979ece906ed44992cc4f220c03d8bba4583b99976e8f64f239fb721d0cff9ff694b6d4baf9b2389c6e5a2c04a689d3f98fffa21e17f93870adca84059d904f204afaf90ede6269e45efb9f1294c57948bddee29b620bb74da1c2cb2ed298ea6eb1486be8cdd6987a018f52e8e3e89ff3a3ed3dda52d10d144192ef56d6046143063f17a91586e72ee040a879ef25c8c232d6624b7507a5009cf8c9f0f8fcc36f7ee1a35688e773f4fb83f661826b128bbf68a2899886413b8", 0x1000}, {&(0x7f0000000300)="4a79d8076b90013d8bfd6980b767fd353358e4e3cabbd477ef88a2f198bda24734b69b63641c2fcf1fd35c0ac218c6c9ab9e965f1bbc57a2e299b1a435f9c99c705afefefca6c3936a3897748e523f023140e159fbbecc874d2249d69e67431c4da622492d62ab1b78e0cf96132064a8e603d657a6e8b54eb3a6a3501600aa12406cb0f6af10ed3051f94b720a800c03bc7fbb2055911944db0b60141d75d4e2afeec9ef6b8290017a339e19c4f943f71e748f5506c0a57455b4345b7fe73d89a72349f2c7b78dd3", 0xc8}, {&(0x7f0000000400)="ef1757907af6397190ae644e74437b4eb7eb1f22acfff38a83af40be40a234a01f092a1a38091b42443f11d8d93e9755be9a09d9f319bc8137c8f5032a6d2977d9e01954047106e00fbe5bef35abbd6e31d37f1a8b9043d06582528facdd28aa7daa2aeaef330afdd39c", 0x6a}, {&(0x7f0000000480)="67639a55edd337c10d0ee9cc2ae620039ae4c3cff8c4", 0x16}, {&(0x7f00000004c0)="c56bae40ace29f96b4b3cbb69a44cdadf84ed089a8f3138330bf76da282354304dde43e8fb4844e6795715e120c6760f804cc534022a052786e4482047527b8d9a073d983555dbd6cf08561bc0a38884fe54e499417a203220a48cd8109595203aa90f72251c06e97083c2b87c1a13c61773f8", 0x73}, {&(0x7f0000000540)="5410793dfb4021a888f245", 0xb}], 0x9, &(0x7f0000000640)="d86e52963975cbbf98e954fb2c763f5df53b5b6a1993a6a4114bf9568716619d6a75605da97a3b35dc086297c12e59c6cf64b7a81ff6d690386731a2bbbb759cd2a9577efbbcf20f0ec164b71b1073afd6818e19305c35de06b97dedd0f493e87746fc5879b34c37caf97eff40f5c1b7c16fa4dea2e90d2d394fe8be36a5c3b40eb98cfff87b14f28dabdf4cccd73e41ea6d9c00346b33b4d0782592db188c5d20e29b252158347c6f580accb0425f17ca681842841a2ea7e97215a6df68828ca5", 0xc1, 0x4044}, 0x8900) close(r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)='bridge0\x00'}, 0x30) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000000)=0xfffffffe) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) (async) sendmsg$tipc(r2, &(0x7f0000000480)={&(0x7f00000002c0)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000300)="1f", 0x1}, {&(0x7f0000000380)='t', 0x1}, {0x0}], 0x3, &(0x7f0000000440)="0b2533ba3211a0a1c6ed2b556fcbf229fc72ebb3e8b15320ceec3efb77d9ee23375910d8b9", 0x25}, 0x0) (async) sendmsg$tipc(r2, &(0x7f0000000740)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x4, 0x4}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000100)="3dd221b7c11286af0bad5bf0f9b05394cb66b503dee0bcf8440d0a8af360bd3099e3e576f57e7a1b4483a2c53d079bbe97bd48860431b1b8b2efe15787264c91b0b0db7363a188831fd711a95d2eb07ea199cb49a839886dabc20c230b9d1b51e0657e18f7d264751fabcb1fd6e5ada33e2ed3b7cb33c306789532ba346e87a6ada4e1f7c6038afd894bacaeb28de11bf25b99f83451fa", 0x97}, {&(0x7f00000001c0)="e7de2d2d5ab666891547b6b17acc6a2ffea1bf", 0x13}, {&(0x7f0000000200)="8f3a24011fd981eaf0b76c1fc30de1c3a9be5aeb83faa5d06d5709b32c2806b37336d8b4af1b84650ecb085c301e31f5b21ffc8234573eb0d5c5a85af5ad38a2a152c871b61ae8c8eab105b661b99e018e4be8ddc95d2980572508a29adfff5a5a2131850b40e91c691990b428d3f01cd5237da5e00442ba530e773ec673680d8716e2ca89a4859b590d286dedb4e263b1049ad4169b4d7049206b0a3ded51df981fdd0f8341686e4ee67d567b22a84719ea7bb12b4c5d3468e60bd29270846ca9a760bd2d4d8f38521a85ce0340289c9ca22b563e403d3993d9dc3aa0b58dfec5", 0xe1}, {&(0x7f0000000b00)="15c95a13c2c093c7c94426505ea9b6c39cb6911a0d3f19b79421d0ad062fc928ef959e1c6923e65873382f0efd15b36321362791574521ef3b582c7670a3ea616cd5b043d1f928b2ccb309f9594e1164196d25dc30e9dc20fb6693572df59831e4279825120109939465760f19eb51c7674bdcb5e789b158154059fac4ee88fa5d0b9d3ed52f1141cfc92dc478ff5b2c1c250aef654b14caa3ead85437767908bbae80aa7a55df4bf183fa0a0097b7fee0704a430f777c1f7c46312e648311dba2a4968a3f7a29438b8c848fb2bad69e220af1731ca9d67707cfb673aecfee5a92e845a1427371ff3350a11d508f1d553ca769d3bbf4e0c2d59fffbf5ae4282f87eff8f02974306361ec473dafa1f857199d4d7aead36af1f57ac3c8e929f35efd24233cdc19622555b072b0138548c1fb530bbec73442bc3d21dc6e3dd1cc7e96e43da0278aff565ec3ffd91b529bb065f6d33a8e7da7da3faecffc55f24746b513b187f018c80a4e561cfae1423c4fe35ef4025511a3c960e146054a3eed70a1e936cc6c53a87566f60302b91eda0cf402db0a96dfe23e6ad67ca1fa51b40b47a18b19ba6ea744e9d4e08a7434f9ae60fa5f567023afd5f829259c5cc8096d19c83934f4152dded91a47c0794c61da38cc24edaf471cc3238ae6deb0e43fe1de0b275a8dad5dff4bf7eb8c972b75cf5ed4a298b0b9b238739b5e2933335aa6f9c143c2e1e361ce76b802b1c4f4b93fcad5604211947f6e51b3ccdf5c8cb07c98810c9b60682ae6139dc2ddb364db1faa5a598c23e7ebf596d91c1c587342750e8a8b5dd94d0245fd66be791069270bbfd41ed07903c59f0cebc1c55d0fcab07ac00995fa2244711e66fe2da60bb6e4fc472dbec70acf5d2c1e032329aa6a2be5827a5d263b6a170290f0441afda20ea6c87b8d118e43e4ce936d74a6a37f46e1a545ac04be91aff173d0d6ef0cb5cd786d7ebb02978ea3ab7d2c0e7f0d66ddd6f91f72587ab6443a6f393f88ad8f71b9f57e20bda66e431e32140baf0247bee5d60afa1cc089ec8c504e5edd0c105c07e9fa8ca5a27701ea244c23021034307ddf7f1dee8f05a3bb6da55ec0eb313a174304523a5e03de14a8e66634d5cf5ce3615fa0bc3ad80afad5427f9a332bd3868af5294437e032b5ca1170aca1be6d07effb9bff94e71f4637f66dac75c87e1d775e4752b90fd8e4fd26185e3999affbb7c54745a967278b532871665666e44dc83af469641339ece22fe8579969b30920830ad82930250d9fcf16a9716b657ef040429268f8a738dfff2e15e77c39f3e469a21810e5a1a7ce6c88c64154e43db4dfd429ab99d05dc07025c837526be12af46fd3cba1dcf9c8770e50bc5c4a3ccafc7484fb4317268174837e751e305aefc1eb74661cd43a2234cd29890f3bc1c1e0a0d9fffef3c309f149af921758fd9202b4fa4de661d5caafc157fcbf952add36f0409d65fecde10a0226c9594a035077f967673cdcf85b6960b396af0829084f0ee7d9fdfb94e0b4f363d91509deade482d6a2362b2aa056a89c21701d41a988ab55b1cc5abaa4602aa0061cc240603a3f2ab4878690e6aeea0c187864845bfad6dcc417b8da583385fd17d2ff6659639a5c944a27d7aebfe24d32b8140e62aca6f2c41fc6ff2abc278aebe77af00a4e198f94adf50df65810983df23b0e12b4e2a5deaff18c6993ca9791f1cfa4464ad9f66e1db8375cee17317f1b4fb20ee9bc79a328cefbfceca0b9bbe841ccb62822b0ee1246a716c68f802183c5f9d57dd27ab74aeb67a796db71a9cff1e0076de55f6aaef06794dfe155655f90c57b4d054c89f092de02d82fcebeda958e4a508e6af7e2a06d062192b0b63a123f817135a0d6ab5b0f0d671863fa5595de33026bcf70c68a4be33f92ff74361cf3d93a89244ea3205076c359b9d051eefdc1c6763b5b5488c860022115d240330644b3749e2e929c2f774de3bfdb755cc5e3fbb711b4cf128e1dd7cdb828ea58895b83a8d23cc600f2e91f6b830c9fc00309fdac3bd9e365fef698689d536a04f24e51a0d39f6d92f2340fb74931ecedf3d359f98b0d053b44b5daf920fe753f98df3bb33e0aa7099a664445b19b32246f3619c1e5a9c8366dca139512252167320cf9ba8aa8954b25a745db77fc5a77a9627796e35f59f2b9d4305d1cc68d0ca5bfdb9790f93b0cb1d7baa818a8d040babaea20d1ed65ea5a551029eb2a08165f8abfd48aae0e0821e2899f07cee79502016ce59cbcaae57d44db91a272361657bfd4db6ace6489943d2dee2417cc33aef68d34d70baf79eb00371b5678667ccb33b10713a0592269d26329eb6e1c43847d3e1bdcdb0b8bf899d701796fe49e6414f2e3900eaf63f242103aa7cd32c9066ede594b0968f0a04991bb8df429e1698bb5535d07349d095f20386eba15aa642d8e7c545a26fd79a01e1bcfc2957049edaa35bea3c5e094773ad811f2fedc99fb7a974789317fb8594892786aaf41871cdd0b85046fc76029f29d80f9a011718026884e389ea3427eb7dd18693868895d441d749251e65b4c9ec8ee0e963253ef99d205aeb17268a0efeb2734f8834fa47664c4fabc61e747f6cae5d46cd4cd88ac6fc29cf5b61fe7710ac08b93e06a80d4e79de6a8128c131f4d3a7263161ec5a4344619bfcb1d741e835484a792affcfcdabdc89e8d7bc42f05d9300ef4c61cc21bfef640c6288b6413df26815cc5f5b3def187361a985fb23bfbcf05c3d26680c2545699fb4732d50fafdde926a240f803a8ee2ab96764a24b8cdfe227a23001f1aeb28ffcfe0b80360aaeed1bee18a22caae6f75675c683def7441f5b5444a4bbea8db554fd6b45f301fb4b88371ca44cd40d892368d7c5cc9e172ab34a85c818e5686a6ebdf89290f0eafe9260c221f928bcca90d75136000f05572b3ce357d02a7ace959b3546bfc7644d2e118fa3d7dcadb74cd9ade5a0865a5968ba68655c0d8c30292cfadc08ef063b9ee1c642371858e81a5d64c3e9071b023c42e217b746f7d961e6bd713c13c77f09d6f95c352d812570a3d71c372b25c4624d9a1dcdc823b2f9e38cee1b30e2476e7e85f04cca0cfe62a9b22b6ce2c6bb845d32db4f9b9b6db35e74f054ae31e65c82a742eb90b8e02d397521f9277c11981c3075cf0f576715b99e80f8c4f25bae5a5437159108d4f9cf61346ba527f272992c337f08b572efef4cc7fd4ddbe38370472835ca99f1a8960da6ecc033c451f71676ef553dfe296cfa9352c1c8f9933e00d82620190673cdde31004a069563c0ee3f75544eb94331f66d06c3a476a018e7191674f05a620dd60d58b1c541e62a8c26eb600e2d6fa522405d0a369be0849773ea617d5491531f985d028f18ac1f084f916fb6fb2a991442dc523f848c9a87ff8b4997dd34ae84855f4aaafad3f96fcc62e3dff48e1092c3446c24a81306c4fee1c884859940d956d3ef9cb614f62bf5b2e9bfc21d4a1bbdecf775a725053119793643adfac77dc12ac61248042127db88044f83fda258f8757dcf0ec095190a3298ade5e3dae8a45a29d2e722ca1d6f350bd2cefd85337514912784b7674c0b24073fcf0a4ea188c3cc539eb5eaf0097c8b649539db6c1d55c9aa5a6791ef1a1ede7ff6658e0f462032a4ef9cc440f187d8b015047e4d143caf3821837b621bea5c4ba52f0ab5d4644be200cbe5bda303a32a4457ce52c90e53fd4e7902ced8fbf8e93295476befde7534e9e6654db05953cbeb128ae5af89480022786f4102784d3946d37cd01551e2a96ac16ff1582a06172d796af4444cc498d80c629d47a80f9b2bce3cf632499fc68c627c6c200c6ef9aeb1941ce245d92b3b98db38620d0ad1da1f820e04c407fab2ea081ce960700fa494b738b9d5f2461b1ffd7e5c090a2ac026d5be8f249a42315c5bb2e7d2564aa6c870c804d43c704166a8bb6a3a420a3577b0b09f57db4dabe2e9439ca6c074f32e7f3ff636f5b2af215c2cdc9a356c91ceaefc6544d2da43779707bf29764695b0040e080a138e5349f0fb56838fadaae466b3b9b964a1aabbb0aee1249fce3a947cd2b221402e6570120df26e9d95d3db64743e8a42184e458f78be2e38f7139f90dabeb0a66ec827e73e73d072593eb9f0bce6f98fdd64e266afb756c7077d78c9e9d6d8f6584a83a88808cc1a607a3b4f784cf612067e03988988a8b73c0ad1f07c543c7f3ba711faf057828ac28a01d02d7ae5d4f2d75ba12bc9d1c406fc7434c4ea56048c864c7108a833f84d4452193c98047fed19158fcae040e8feb9d1b89803fc48435638205a94af56dbe4e7a2c69cf371f38537919d6d53f904287f926d9c97cd8273b01402bdd2e96e6ebaab406abd483eb7d14838b5e1eab8693326a672e313e09bd890a13957d75b296f98a86832ddfab01e67603162565eaa2f18dbc84be1e8581208bbd3e9636fd9893604957f74dfe350601c8a7ed232ceae4782ca08349c7fe034aa979cad2f5ca1aed6faf055950b8c68d9c54c80885ebd0605f89532b161df44829913a26c36882d9d4d21baf6232f414c8cabf65eb7488d1986a0f3607f81d170848191e9d2513ce05bca7169220c5faa49aa4d76d415e780b6c3e6f66a479ca3a4170b0bda78444916cc006e4df63eca32ae4b25c7ae475d895d9c58f97bb2d773f0db13cdf5c8ebe2a3c3d5a6d2a5416602a8058d7904840c761eac8b6170f3ab7825d424aa8d9632a4917f6c7bcdfd622de28e0226f365155d03645db54fa541bf0babdf3ff2b6ca0c26453df68a777390a27e2499389c7da4a21e6059d9d19a746c8bd65adfb832a3988cca4255a461935d569d58c92c3a8a322400407c3cb7bfeb64007cabadc69ce2771417e7f4d30de242df60b0b7e10e7ea8dffb88be5c55f92a6dc571c0bf5d36dc6c118e26a638e2dd00b25adfbf8e4f2066363d34ba2941ca391cbdcca3c9b941a60efa909fbd78a588632cfa9101383a90094bd27bbc048c2fc5d2cd7946a04ad9d1f653f96b1e8983a4611a210c254af2f67f46964c0ec561162694539b631b5b92053a7f2a2de5e5be721c2762de6ae6a0c3fcc4f1c533075da67e69e168f6082c8c3ac56f7f2248586f78ed363018ccde8375305b7b26e11b638c6a954a1d79ed7f30e529bec47c98d7f6b313507c7e5e501e27ca6c8665c760d590ee972856f1f747259479950a68c87c4fff260c3dde4513764b01cc11499933ea82c8e9f54978311da178549827231d90da7d7d4fa4b8214bab690cb2780919e9be082ec6465bba21b3b3a45a85a0390ca0458fee74cd610f09a8bc6637b6ef5f346d3271c753c7b38d5b0f78809f88d4d8663921dbb8922c4cecd547373927eae69743c6f9e2111efb44634a36cacb63acf701291e538f679cd75411b041af3bdc03497a33420bf28dabc60dee30ad3546fbe29d2d0389bc1013ff37219ecde699cb0177464a0da612679949eedd5c414fd8d23ea5cf3051d07a5a9a8ca18644eea57d0f0ba9b5237b8042d42979ece906ed44992cc4f220c03d8bba4583b99976e8f64f239fb721d0cff9ff694b6d4baf9b2389c6e5a2c04a689d3f98fffa21e17f93870adca84059d904f204afaf90ede6269e45efb9f1294c57948bddee29b620bb74da1c2cb2ed298ea6eb1486be8cdd6987a018f52e8e3e89ff3a3ed3dda52d10d144192ef56d6046143063f17a91586e72ee040a879ef25c8c232d6624b7507a5009cf8c9f0f8fcc36f7ee1a35688e773f4fb83f661826b128bbf68a2899886413b8", 0x1000}, {&(0x7f0000000300)="4a79d8076b90013d8bfd6980b767fd353358e4e3cabbd477ef88a2f198bda24734b69b63641c2fcf1fd35c0ac218c6c9ab9e965f1bbc57a2e299b1a435f9c99c705afefefca6c3936a3897748e523f023140e159fbbecc874d2249d69e67431c4da622492d62ab1b78e0cf96132064a8e603d657a6e8b54eb3a6a3501600aa12406cb0f6af10ed3051f94b720a800c03bc7fbb2055911944db0b60141d75d4e2afeec9ef6b8290017a339e19c4f943f71e748f5506c0a57455b4345b7fe73d89a72349f2c7b78dd3", 0xc8}, {&(0x7f0000000400)="ef1757907af6397190ae644e74437b4eb7eb1f22acfff38a83af40be40a234a01f092a1a38091b42443f11d8d93e9755be9a09d9f319bc8137c8f5032a6d2977d9e01954047106e00fbe5bef35abbd6e31d37f1a8b9043d06582528facdd28aa7daa2aeaef330afdd39c", 0x6a}, {&(0x7f0000000480)="67639a55edd337c10d0ee9cc2ae620039ae4c3cff8c4", 0x16}, {&(0x7f00000004c0)="c56bae40ace29f96b4b3cbb69a44cdadf84ed089a8f3138330bf76da282354304dde43e8fb4844e6795715e120c6760f804cc534022a052786e4482047527b8d9a073d983555dbd6cf08561bc0a38884fe54e499417a203220a48cd8109595203aa90f72251c06e97083c2b87c1a13c61773f8", 0x73}, {&(0x7f0000000540)="5410793dfb4021a888f245", 0xb}], 0x9, &(0x7f0000000640)="d86e52963975cbbf98e954fb2c763f5df53b5b6a1993a6a4114bf9568716619d6a75605da97a3b35dc086297c12e59c6cf64b7a81ff6d690386731a2bbbb759cd2a9577efbbcf20f0ec164b71b1073afd6818e19305c35de06b97dedd0f493e87746fc5879b34c37caf97eff40f5c1b7c16fa4dea2e90d2d394fe8be36a5c3b40eb98cfff87b14f28dabdf4cccd73e41ea6d9c00346b33b4d0782592db188c5d20e29b252158347c6f580accb0425f17ca681842841a2ea7e97215a6df68828ca5", 0xc1, 0x4044}, 0x8900) (async) close(r1) (async) gettid() (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)='bridge0\x00'}, 0x30) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000000)=0xfffffffe) (async) close(r0) (async) [ 2857.001602][T32571] FAULT_INJECTION: forcing a failure. [ 2857.001602][T32571] name failslab, interval 1, probability 0, space 0, times 0 [ 2857.021587][T32571] CPU: 0 PID: 32571 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2857.031645][T32571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2857.041539][T32571] Call Trace: [ 2857.044666][T32571] [ 2857.047438][T32571] dump_stack_lvl+0x151/0x1b7 [ 2857.051954][T32571] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2857.057246][T32571] dump_stack+0x15/0x17 [ 2857.061246][T32571] should_fail+0x3c0/0x510 [ 2857.065494][T32571] __should_failslab+0x9f/0xe0 [ 2857.070091][T32571] should_failslab+0x9/0x20 [ 2857.074430][T32571] kmem_cache_alloc+0x4f/0x2f0 [ 2857.079030][T32571] ? vm_area_dup+0x26/0x1d0 [ 2857.083371][T32571] vm_area_dup+0x26/0x1d0 [ 2857.087537][T32571] dup_mmap+0x6b8/0xea0 [ 2857.091531][T32571] ? __delayed_free_task+0x20/0x20 [ 2857.096476][T32571] ? mm_init+0x807/0x960 [ 2857.100558][T32571] dup_mm+0x91/0x330 [ 2857.104288][T32571] copy_mm+0x108/0x1b0 [ 2857.108193][T32571] copy_process+0x1295/0x3250 [ 2857.112712][T32571] ? proc_fail_nth_write+0x213/0x290 [ 2857.117828][T32571] ? proc_fail_nth_read+0x220/0x220 [ 2857.122863][T32571] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2857.127807][T32571] ? vfs_write+0x9af/0x1050 [ 2857.132148][T32571] ? vmacache_update+0xb7/0x120 [ 2857.136834][T32571] kernel_clone+0x22d/0x990 [ 2857.141173][T32571] ? file_end_write+0x1b0/0x1b0 [ 2857.145862][T32571] ? __kasan_check_write+0x14/0x20 [ 2857.150809][T32571] ? create_io_thread+0x1e0/0x1e0 [ 2857.155668][T32571] ? __mutex_lock_slowpath+0x10/0x10 [ 2857.160790][T32571] __x64_sys_clone+0x289/0x310 [ 2857.165390][T32571] ? __do_sys_vfork+0x130/0x130 [ 2857.170076][T32571] ? debug_smp_processor_id+0x17/0x20 [ 2857.175282][T32571] do_syscall_64+0x44/0xd0 [ 2857.179538][T32571] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2857.185264][T32571] RIP: 0033:0x7f4243ed90d9 [ 2857.189520][T32571] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2857.208958][T32571] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2857.217202][T32571] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2857.225012][T32571] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2857.232831][T32571] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2857.240637][T32571] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:42:05 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 58) 07:42:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) 07:42:05 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x64, 0x10, 0x0}, 0x80) 07:42:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000480)={&(0x7f00000002c0)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000300)="1f", 0x1}, {&(0x7f0000000380)='t', 0x1}, {0x0}], 0x3, &(0x7f0000000440)="0b2533ba3211a0a1c6ed2b556fcbf229fc72ebb3e8b15320ceec3efb77d9ee23375910d8b9", 0x25}, 0x0) (async) sendmsg$tipc(r2, &(0x7f0000000740)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x4, 0x4}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000100)="3dd221b7c11286af0bad5bf0f9b05394cb66b503dee0bcf8440d0a8af360bd3099e3e576f57e7a1b4483a2c53d079bbe97bd48860431b1b8b2efe15787264c91b0b0db7363a188831fd711a95d2eb07ea199cb49a839886dabc20c230b9d1b51e0657e18f7d264751fabcb1fd6e5ada33e2ed3b7cb33c306789532ba346e87a6ada4e1f7c6038afd894bacaeb28de11bf25b99f83451fa", 0x97}, {&(0x7f00000001c0)="e7de2d2d5ab666891547b6b17acc6a2ffea1bf", 0x13}, {&(0x7f0000000200)="8f3a24011fd981eaf0b76c1fc30de1c3a9be5aeb83faa5d06d5709b32c2806b37336d8b4af1b84650ecb085c301e31f5b21ffc8234573eb0d5c5a85af5ad38a2a152c871b61ae8c8eab105b661b99e018e4be8ddc95d2980572508a29adfff5a5a2131850b40e91c691990b428d3f01cd5237da5e00442ba530e773ec673680d8716e2ca89a4859b590d286dedb4e263b1049ad4169b4d7049206b0a3ded51df981fdd0f8341686e4ee67d567b22a84719ea7bb12b4c5d3468e60bd29270846ca9a760bd2d4d8f38521a85ce0340289c9ca22b563e403d3993d9dc3aa0b58dfec5", 0xe1}, {&(0x7f0000000b00)="15c95a13c2c093c7c94426505ea9b6c39cb6911a0d3f19b79421d0ad062fc928ef959e1c6923e65873382f0efd15b36321362791574521ef3b582c7670a3ea616cd5b043d1f928b2ccb309f9594e1164196d25dc30e9dc20fb6693572df59831e4279825120109939465760f19eb51c7674bdcb5e789b158154059fac4ee88fa5d0b9d3ed52f1141cfc92dc478ff5b2c1c250aef654b14caa3ead85437767908bbae80aa7a55df4bf183fa0a0097b7fee0704a430f777c1f7c46312e648311dba2a4968a3f7a29438b8c848fb2bad69e220af1731ca9d67707cfb673aecfee5a92e845a1427371ff3350a11d508f1d553ca769d3bbf4e0c2d59fffbf5ae4282f87eff8f02974306361ec473dafa1f857199d4d7aead36af1f57ac3c8e929f35efd24233cdc19622555b072b0138548c1fb530bbec73442bc3d21dc6e3dd1cc7e96e43da0278aff565ec3ffd91b529bb065f6d33a8e7da7da3faecffc55f24746b513b187f018c80a4e561cfae1423c4fe35ef4025511a3c960e146054a3eed70a1e936cc6c53a87566f60302b91eda0cf402db0a96dfe23e6ad67ca1fa51b40b47a18b19ba6ea744e9d4e08a7434f9ae60fa5f567023afd5f829259c5cc8096d19c83934f4152dded91a47c0794c61da38cc24edaf471cc3238ae6deb0e43fe1de0b275a8dad5dff4bf7eb8c972b75cf5ed4a298b0b9b238739b5e2933335aa6f9c143c2e1e361ce76b802b1c4f4b93fcad5604211947f6e51b3ccdf5c8cb07c98810c9b60682ae6139dc2ddb364db1faa5a598c23e7ebf596d91c1c587342750e8a8b5dd94d0245fd66be791069270bbfd41ed07903c59f0cebc1c55d0fcab07ac00995fa2244711e66fe2da60bb6e4fc472dbec70acf5d2c1e032329aa6a2be5827a5d263b6a170290f0441afda20ea6c87b8d118e43e4ce936d74a6a37f46e1a545ac04be91aff173d0d6ef0cb5cd786d7ebb02978ea3ab7d2c0e7f0d66ddd6f91f72587ab6443a6f393f88ad8f71b9f57e20bda66e431e32140baf0247bee5d60afa1cc089ec8c504e5edd0c105c07e9fa8ca5a27701ea244c23021034307ddf7f1dee8f05a3bb6da55ec0eb313a174304523a5e03de14a8e66634d5cf5ce3615fa0bc3ad80afad5427f9a332bd3868af5294437e032b5ca1170aca1be6d07effb9bff94e71f4637f66dac75c87e1d775e4752b90fd8e4fd26185e3999affbb7c54745a967278b532871665666e44dc83af469641339ece22fe8579969b30920830ad82930250d9fcf16a9716b657ef040429268f8a738dfff2e15e77c39f3e469a21810e5a1a7ce6c88c64154e43db4dfd429ab99d05dc07025c837526be12af46fd3cba1dcf9c8770e50bc5c4a3ccafc7484fb4317268174837e751e305aefc1eb74661cd43a2234cd29890f3bc1c1e0a0d9fffef3c309f149af921758fd9202b4fa4de661d5caafc157fcbf952add36f0409d65fecde10a0226c9594a035077f967673cdcf85b6960b396af0829084f0ee7d9fdfb94e0b4f363d91509deade482d6a2362b2aa056a89c21701d41a988ab55b1cc5abaa4602aa0061cc240603a3f2ab4878690e6aeea0c187864845bfad6dcc417b8da583385fd17d2ff6659639a5c944a27d7aebfe24d32b8140e62aca6f2c41fc6ff2abc278aebe77af00a4e198f94adf50df65810983df23b0e12b4e2a5deaff18c6993ca9791f1cfa4464ad9f66e1db8375cee17317f1b4fb20ee9bc79a328cefbfceca0b9bbe841ccb62822b0ee1246a716c68f802183c5f9d57dd27ab74aeb67a796db71a9cff1e0076de55f6aaef06794dfe155655f90c57b4d054c89f092de02d82fcebeda958e4a508e6af7e2a06d062192b0b63a123f817135a0d6ab5b0f0d671863fa5595de33026bcf70c68a4be33f92ff74361cf3d93a89244ea3205076c359b9d051eefdc1c6763b5b5488c860022115d240330644b3749e2e929c2f774de3bfdb755cc5e3fbb711b4cf128e1dd7cdb828ea58895b83a8d23cc600f2e91f6b830c9fc00309fdac3bd9e365fef698689d536a04f24e51a0d39f6d92f2340fb74931ecedf3d359f98b0d053b44b5daf920fe753f98df3bb33e0aa7099a664445b19b32246f3619c1e5a9c8366dca139512252167320cf9ba8aa8954b25a745db77fc5a77a9627796e35f59f2b9d4305d1cc68d0ca5bfdb9790f93b0cb1d7baa818a8d040babaea20d1ed65ea5a551029eb2a08165f8abfd48aae0e0821e2899f07cee79502016ce59cbcaae57d44db91a272361657bfd4db6ace6489943d2dee2417cc33aef68d34d70baf79eb00371b5678667ccb33b10713a0592269d26329eb6e1c43847d3e1bdcdb0b8bf899d701796fe49e6414f2e3900eaf63f242103aa7cd32c9066ede594b0968f0a04991bb8df429e1698bb5535d07349d095f20386eba15aa642d8e7c545a26fd79a01e1bcfc2957049edaa35bea3c5e094773ad811f2fedc99fb7a974789317fb8594892786aaf41871cdd0b85046fc76029f29d80f9a011718026884e389ea3427eb7dd18693868895d441d749251e65b4c9ec8ee0e963253ef99d205aeb17268a0efeb2734f8834fa47664c4fabc61e747f6cae5d46cd4cd88ac6fc29cf5b61fe7710ac08b93e06a80d4e79de6a8128c131f4d3a7263161ec5a4344619bfcb1d741e835484a792affcfcdabdc89e8d7bc42f05d9300ef4c61cc21bfef640c6288b6413df26815cc5f5b3def187361a985fb23bfbcf05c3d26680c2545699fb4732d50fafdde926a240f803a8ee2ab96764a24b8cdfe227a23001f1aeb28ffcfe0b80360aaeed1bee18a22caae6f75675c683def7441f5b5444a4bbea8db554fd6b45f301fb4b88371ca44cd40d892368d7c5cc9e172ab34a85c818e5686a6ebdf89290f0eafe9260c221f928bcca90d75136000f05572b3ce357d02a7ace959b3546bfc7644d2e118fa3d7dcadb74cd9ade5a0865a5968ba68655c0d8c30292cfadc08ef063b9ee1c642371858e81a5d64c3e9071b023c42e217b746f7d961e6bd713c13c77f09d6f95c352d812570a3d71c372b25c4624d9a1dcdc823b2f9e38cee1b30e2476e7e85f04cca0cfe62a9b22b6ce2c6bb845d32db4f9b9b6db35e74f054ae31e65c82a742eb90b8e02d397521f9277c11981c3075cf0f576715b99e80f8c4f25bae5a5437159108d4f9cf61346ba527f272992c337f08b572efef4cc7fd4ddbe38370472835ca99f1a8960da6ecc033c451f71676ef553dfe296cfa9352c1c8f9933e00d82620190673cdde31004a069563c0ee3f75544eb94331f66d06c3a476a018e7191674f05a620dd60d58b1c541e62a8c26eb600e2d6fa522405d0a369be0849773ea617d5491531f985d028f18ac1f084f916fb6fb2a991442dc523f848c9a87ff8b4997dd34ae84855f4aaafad3f96fcc62e3dff48e1092c3446c24a81306c4fee1c884859940d956d3ef9cb614f62bf5b2e9bfc21d4a1bbdecf775a725053119793643adfac77dc12ac61248042127db88044f83fda258f8757dcf0ec095190a3298ade5e3dae8a45a29d2e722ca1d6f350bd2cefd85337514912784b7674c0b24073fcf0a4ea188c3cc539eb5eaf0097c8b649539db6c1d55c9aa5a6791ef1a1ede7ff6658e0f462032a4ef9cc440f187d8b015047e4d143caf3821837b621bea5c4ba52f0ab5d4644be200cbe5bda303a32a4457ce52c90e53fd4e7902ced8fbf8e93295476befde7534e9e6654db05953cbeb128ae5af89480022786f4102784d3946d37cd01551e2a96ac16ff1582a06172d796af4444cc498d80c629d47a80f9b2bce3cf632499fc68c627c6c200c6ef9aeb1941ce245d92b3b98db38620d0ad1da1f820e04c407fab2ea081ce960700fa494b738b9d5f2461b1ffd7e5c090a2ac026d5be8f249a42315c5bb2e7d2564aa6c870c804d43c704166a8bb6a3a420a3577b0b09f57db4dabe2e9439ca6c074f32e7f3ff636f5b2af215c2cdc9a356c91ceaefc6544d2da43779707bf29764695b0040e080a138e5349f0fb56838fadaae466b3b9b964a1aabbb0aee1249fce3a947cd2b221402e6570120df26e9d95d3db64743e8a42184e458f78be2e38f7139f90dabeb0a66ec827e73e73d072593eb9f0bce6f98fdd64e266afb756c7077d78c9e9d6d8f6584a83a88808cc1a607a3b4f784cf612067e03988988a8b73c0ad1f07c543c7f3ba711faf057828ac28a01d02d7ae5d4f2d75ba12bc9d1c406fc7434c4ea56048c864c7108a833f84d4452193c98047fed19158fcae040e8feb9d1b89803fc48435638205a94af56dbe4e7a2c69cf371f38537919d6d53f904287f926d9c97cd8273b01402bdd2e96e6ebaab406abd483eb7d14838b5e1eab8693326a672e313e09bd890a13957d75b296f98a86832ddfab01e67603162565eaa2f18dbc84be1e8581208bbd3e9636fd9893604957f74dfe350601c8a7ed232ceae4782ca08349c7fe034aa979cad2f5ca1aed6faf055950b8c68d9c54c80885ebd0605f89532b161df44829913a26c36882d9d4d21baf6232f414c8cabf65eb7488d1986a0f3607f81d170848191e9d2513ce05bca7169220c5faa49aa4d76d415e780b6c3e6f66a479ca3a4170b0bda78444916cc006e4df63eca32ae4b25c7ae475d895d9c58f97bb2d773f0db13cdf5c8ebe2a3c3d5a6d2a5416602a8058d7904840c761eac8b6170f3ab7825d424aa8d9632a4917f6c7bcdfd622de28e0226f365155d03645db54fa541bf0babdf3ff2b6ca0c26453df68a777390a27e2499389c7da4a21e6059d9d19a746c8bd65adfb832a3988cca4255a461935d569d58c92c3a8a322400407c3cb7bfeb64007cabadc69ce2771417e7f4d30de242df60b0b7e10e7ea8dffb88be5c55f92a6dc571c0bf5d36dc6c118e26a638e2dd00b25adfbf8e4f2066363d34ba2941ca391cbdcca3c9b941a60efa909fbd78a588632cfa9101383a90094bd27bbc048c2fc5d2cd7946a04ad9d1f653f96b1e8983a4611a210c254af2f67f46964c0ec561162694539b631b5b92053a7f2a2de5e5be721c2762de6ae6a0c3fcc4f1c533075da67e69e168f6082c8c3ac56f7f2248586f78ed363018ccde8375305b7b26e11b638c6a954a1d79ed7f30e529bec47c98d7f6b313507c7e5e501e27ca6c8665c760d590ee972856f1f747259479950a68c87c4fff260c3dde4513764b01cc11499933ea82c8e9f54978311da178549827231d90da7d7d4fa4b8214bab690cb2780919e9be082ec6465bba21b3b3a45a85a0390ca0458fee74cd610f09a8bc6637b6ef5f346d3271c753c7b38d5b0f78809f88d4d8663921dbb8922c4cecd547373927eae69743c6f9e2111efb44634a36cacb63acf701291e538f679cd75411b041af3bdc03497a33420bf28dabc60dee30ad3546fbe29d2d0389bc1013ff37219ecde699cb0177464a0da612679949eedd5c414fd8d23ea5cf3051d07a5a9a8ca18644eea57d0f0ba9b5237b8042d42979ece906ed44992cc4f220c03d8bba4583b99976e8f64f239fb721d0cff9ff694b6d4baf9b2389c6e5a2c04a689d3f98fffa21e17f93870adca84059d904f204afaf90ede6269e45efb9f1294c57948bddee29b620bb74da1c2cb2ed298ea6eb1486be8cdd6987a018f52e8e3e89ff3a3ed3dda52d10d144192ef56d6046143063f17a91586e72ee040a879ef25c8c232d6624b7507a5009cf8c9f0f8fcc36f7ee1a35688e773f4fb83f661826b128bbf68a2899886413b8", 0x1000}, {&(0x7f0000000300)="4a79d8076b90013d8bfd6980b767fd353358e4e3cabbd477ef88a2f198bda24734b69b63641c2fcf1fd35c0ac218c6c9ab9e965f1bbc57a2e299b1a435f9c99c705afefefca6c3936a3897748e523f023140e159fbbecc874d2249d69e67431c4da622492d62ab1b78e0cf96132064a8e603d657a6e8b54eb3a6a3501600aa12406cb0f6af10ed3051f94b720a800c03bc7fbb2055911944db0b60141d75d4e2afeec9ef6b8290017a339e19c4f943f71e748f5506c0a57455b4345b7fe73d89a72349f2c7b78dd3", 0xc8}, {&(0x7f0000000400)="ef1757907af6397190ae644e74437b4eb7eb1f22acfff38a83af40be40a234a01f092a1a38091b42443f11d8d93e9755be9a09d9f319bc8137c8f5032a6d2977d9e01954047106e00fbe5bef35abbd6e31d37f1a8b9043d06582528facdd28aa7daa2aeaef330afdd39c", 0x6a}, {&(0x7f0000000480)="67639a55edd337c10d0ee9cc2ae620039ae4c3cff8c4", 0x16}, {&(0x7f00000004c0)="c56bae40ace29f96b4b3cbb69a44cdadf84ed089a8f3138330bf76da282354304dde43e8fb4844e6795715e120c6760f804cc534022a052786e4482047527b8d9a073d983555dbd6cf08561bc0a38884fe54e499417a203220a48cd8109595203aa90f72251c06e97083c2b87c1a13c61773f8", 0x73}, {&(0x7f0000000540)="5410793dfb4021a888f245", 0xb}], 0x9, &(0x7f0000000640)="d86e52963975cbbf98e954fb2c763f5df53b5b6a1993a6a4114bf9568716619d6a75605da97a3b35dc086297c12e59c6cf64b7a81ff6d690386731a2bbbb759cd2a9577efbbcf20f0ec164b71b1073afd6818e19305c35de06b97dedd0f493e87746fc5879b34c37caf97eff40f5c1b7c16fa4dea2e90d2d394fe8be36a5c3b40eb98cfff87b14f28dabdf4cccd73e41ea6d9c00346b33b4d0782592db188c5d20e29b252158347c6f580accb0425f17ca681842841a2ea7e97215a6df68828ca5", 0xc1, 0x4044}, 0x8900) (async) close(r1) (async) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)='bridge0\x00'}, 0x30) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000000)=0xfffffffe) (async) close(r0) 07:42:05 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000740000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2857.248448][T32571] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2857.256261][T32571] [ 2857.292534][T32599] FAULT_INJECTION: forcing a failure. [ 2857.292534][T32599] name failslab, interval 1, probability 0, space 0, times 0 [ 2857.305037][T32599] CPU: 0 PID: 32599 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2857.315012][T32599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2857.324906][T32599] Call Trace: [ 2857.328030][T32599] [ 2857.330806][T32599] dump_stack_lvl+0x151/0x1b7 [ 2857.335321][T32599] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2857.340615][T32599] dump_stack+0x15/0x17 [ 2857.344607][T32599] should_fail+0x3c0/0x510 [ 2857.348860][T32599] __should_failslab+0x9f/0xe0 [ 2857.353459][T32599] should_failslab+0x9/0x20 [ 2857.357798][T32599] kmem_cache_alloc+0x4f/0x2f0 [ 2857.362399][T32599] ? vm_area_dup+0x26/0x1d0 [ 2857.366738][T32599] ? __kasan_check_read+0x11/0x20 [ 2857.371602][T32599] vm_area_dup+0x26/0x1d0 [ 2857.375765][T32599] dup_mmap+0x6b8/0xea0 [ 2857.379759][T32599] ? __delayed_free_task+0x20/0x20 [ 2857.384710][T32599] ? mm_init+0x807/0x960 [ 2857.388783][T32599] dup_mm+0x91/0x330 [ 2857.392517][T32599] copy_mm+0x108/0x1b0 [ 2857.396423][T32599] copy_process+0x1295/0x3250 [ 2857.400936][T32599] ? proc_fail_nth_write+0x213/0x290 [ 2857.406056][T32599] ? proc_fail_nth_read+0x220/0x220 [ 2857.411088][T32599] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2857.416037][T32599] ? vfs_write+0x9af/0x1050 [ 2857.420375][T32599] ? vmacache_update+0xb7/0x120 [ 2857.425063][T32599] kernel_clone+0x22d/0x990 [ 2857.429401][T32599] ? file_end_write+0x1b0/0x1b0 [ 2857.434089][T32599] ? __kasan_check_write+0x14/0x20 [ 2857.439038][T32599] ? create_io_thread+0x1e0/0x1e0 [ 2857.443897][T32599] ? __mutex_lock_slowpath+0x10/0x10 [ 2857.449024][T32599] __x64_sys_clone+0x289/0x310 [ 2857.453618][T32599] ? __do_sys_vfork+0x130/0x130 [ 2857.458304][T32599] ? debug_smp_processor_id+0x17/0x20 [ 2857.463514][T32599] do_syscall_64+0x44/0xd0 [ 2857.467767][T32599] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2857.473493][T32599] RIP: 0033:0x7f4243ed90d9 [ 2857.477745][T32599] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2857.497185][T32599] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2857.505434][T32599] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2857.513244][T32599] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2857.521052][T32599] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2857.528863][T32599] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2857.536679][T32599] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2857.544488][T32599] 07:42:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.numa_stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r2}, 0x8) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000040), 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000080), 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r5, r5, 0xffffffffffffffff, r5, r5, r5, r5, r5, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r6, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r6, r7, 0x1f}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.numa_stat\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r2}, 0x8) (async) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) openat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) (async) openat$cgroup_subtree(r4, &(0x7f0000000040), 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000080), 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r5, r5, 0xffffffffffffffff, r5, r5, r5, r5, r5, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r6, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r6, r7, 0x1f}, 0x10) (async) 07:42:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) (async) write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) 07:42:05 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x68, 0x10, 0x0}, 0x80) 07:42:05 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000790000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) close(r1) close(r0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) openat$cgroup_subtree(r2, &(0x7f0000000080), 0x2, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 07:42:05 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 59) 07:42:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000007a0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) 07:42:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x6c, 0x10, 0x0}, 0x80) 07:42:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) close(r1) close(r0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) openat$cgroup_subtree(r2, &(0x7f0000000080), 0x2, 0x0) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 07:42:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x74, 0x10, 0x0}, 0x80) 07:42:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000007b0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2857.635610][T32607] FAULT_INJECTION: forcing a failure. [ 2857.635610][T32607] name failslab, interval 1, probability 0, space 0, times 0 [ 2857.687137][T32607] CPU: 0 PID: 32607 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2857.697215][T32607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2857.707104][T32607] Call Trace: [ 2857.710228][T32607] [ 2857.713005][T32607] dump_stack_lvl+0x151/0x1b7 [ 2857.717522][T32607] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2857.722813][T32607] dump_stack+0x15/0x17 [ 2857.726803][T32607] should_fail+0x3c0/0x510 [ 2857.731057][T32607] __should_failslab+0x9f/0xe0 [ 2857.735655][T32607] should_failslab+0x9/0x20 [ 2857.739991][T32607] kmem_cache_alloc+0x4f/0x2f0 [ 2857.744598][T32607] ? vm_area_dup+0x26/0x1d0 [ 2857.748933][T32607] vm_area_dup+0x26/0x1d0 [ 2857.753098][T32607] dup_mmap+0x6b8/0xea0 [ 2857.757091][T32607] ? __delayed_free_task+0x20/0x20 [ 2857.762037][T32607] ? mm_init+0x807/0x960 [ 2857.766116][T32607] dup_mm+0x91/0x330 [ 2857.769849][T32607] copy_mm+0x108/0x1b0 [ 2857.773755][T32607] copy_process+0x1295/0x3250 [ 2857.778269][T32607] ? proc_fail_nth_write+0x213/0x290 [ 2857.783388][T32607] ? proc_fail_nth_read+0x220/0x220 [ 2857.788431][T32607] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2857.793371][T32607] ? vfs_write+0x9af/0x1050 [ 2857.797711][T32607] ? vmacache_update+0xb7/0x120 [ 2857.802395][T32607] kernel_clone+0x22d/0x990 [ 2857.806733][T32607] ? file_end_write+0x1b0/0x1b0 [ 2857.811422][T32607] ? __kasan_check_write+0x14/0x20 [ 2857.816367][T32607] ? create_io_thread+0x1e0/0x1e0 [ 2857.821228][T32607] ? __mutex_lock_slowpath+0x10/0x10 [ 2857.826351][T32607] __x64_sys_clone+0x289/0x310 [ 2857.830953][T32607] ? __do_sys_vfork+0x130/0x130 [ 2857.835639][T32607] ? debug_smp_processor_id+0x17/0x20 [ 2857.840845][T32607] do_syscall_64+0x44/0xd0 [ 2857.845097][T32607] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2857.850825][T32607] RIP: 0033:0x7f4243ed90d9 [ 2857.855077][T32607] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2857.874519][T32607] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 07:42:06 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x21c0000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 07:42:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) write$cgroup_pressure(r0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'pimreg\x00', @broadcast}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) 07:42:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) close(r1) close(r0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) (async, rerun: 64) openat$cgroup_subtree(r2, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) (async) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 07:42:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000ffffff850000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x7a, 0x10, 0x0}, 0x80) [ 2857.882762][T32607] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2857.890580][T32607] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2857.898384][T32607] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2857.906200][T32607] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2857.914008][T32607] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2857.921822][T32607] 07:42:06 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 60) 07:42:06 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x21c0000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x21c0000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) (async) 07:42:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xb0, 0x10, 0x0}, 0x80) 07:42:06 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x14}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r5, r5, 0xffffffffffffffff, r5, r5, r5, r5, r5, 0xffffffffffffffff]}, 0x80) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r6, r6, 0xffffffffffffffff, r6, r6, r6, r6, r6, 0xffffffffffffffff]}, 0x80) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETVNETHDRSZ(r10, 0x800454d7, &(0x7f0000000480)) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r11, r11, 0xffffffffffffffff, r11, r11, r11, r11, r11, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x5, &(0x7f0000000500)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0xd, &(0x7f00000005c0)=""/13, 0x20900, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x20005, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r9, r9, 0xffffffffffffffff, r11, r9, r9, r9, r9, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_ext={0x1c, 0xb, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@generic={0x1, 0xa, 0x5, 0x1, 0xffffc000}, @call={0x85, 0x0, 0x0, 0x2f}, @exit, @jmp={0x5, 0x0, 0xc, 0xb, 0x9, 0x6, 0xe}, @call={0x85, 0x0, 0x0, 0x4}, @ldst={0x2, 0x3, 0x1, 0xb, 0x5, 0x6, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @alu={0x7, 0x0, 0xc, 0x9, 0xa, 0x6, 0x4}]}, &(0x7f0000000180)='GPL\x00', 0xffff, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0xc, 0x7, 0x7fffffff}, 0x10, 0x305d9, r2, 0x0, &(0x7f0000000340)=[r3, r4, r0, r5, r6, r7, r8, r9]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r13) close(r12) 07:42:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) write$cgroup_pressure(r0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'pimreg\x00', @broadcast}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'pimreg\x00', @broadcast}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) 07:42:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000001950000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2857.982356][T32658] FAULT_INJECTION: forcing a failure. [ 2857.982356][T32658] name failslab, interval 1, probability 0, space 0, times 0 [ 2857.999082][T32658] CPU: 0 PID: 32658 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2858.009142][T32658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2858.019040][T32658] Call Trace: [ 2858.022171][T32658] [ 2858.024938][T32658] dump_stack_lvl+0x151/0x1b7 [ 2858.029453][T32658] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2858.034752][T32658] dump_stack+0x15/0x17 [ 2858.038737][T32658] should_fail+0x3c0/0x510 [ 2858.042994][T32658] __should_failslab+0x9f/0xe0 [ 2858.047601][T32658] should_failslab+0x9/0x20 [ 2858.051931][T32658] kmem_cache_alloc+0x4f/0x2f0 [ 2858.056530][T32658] ? anon_vma_clone+0xa1/0x4f0 [ 2858.061133][T32658] anon_vma_clone+0xa1/0x4f0 [ 2858.065557][T32658] anon_vma_fork+0x91/0x4f0 [ 2858.069901][T32658] ? anon_vma_name+0x43/0x70 [ 2858.074325][T32658] dup_mmap+0x750/0xea0 [ 2858.078317][T32658] ? __delayed_free_task+0x20/0x20 [ 2858.083263][T32658] ? mm_init+0x807/0x960 [ 2858.087342][T32658] dup_mm+0x91/0x330 [ 2858.091074][T32658] copy_mm+0x108/0x1b0 [ 2858.094982][T32658] copy_process+0x1295/0x3250 [ 2858.099497][T32658] ? proc_fail_nth_write+0x213/0x290 [ 2858.104616][T32658] ? proc_fail_nth_read+0x220/0x220 [ 2858.109654][T32658] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2858.114594][T32658] ? vfs_write+0x9af/0x1050 [ 2858.118932][T32658] ? vmacache_update+0xb7/0x120 [ 2858.123622][T32658] kernel_clone+0x22d/0x990 [ 2858.127961][T32658] ? file_end_write+0x1b0/0x1b0 [ 2858.132652][T32658] ? __kasan_check_write+0x14/0x20 [ 2858.137595][T32658] ? create_io_thread+0x1e0/0x1e0 [ 2858.142454][T32658] ? __mutex_lock_slowpath+0x10/0x10 [ 2858.147576][T32658] __x64_sys_clone+0x289/0x310 [ 2858.152177][T32658] ? __do_sys_vfork+0x130/0x130 [ 2858.156862][T32658] ? debug_smp_processor_id+0x17/0x20 [ 2858.162068][T32658] do_syscall_64+0x44/0xd0 [ 2858.166322][T32658] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2858.172049][T32658] RIP: 0033:0x7f4243ed90d9 [ 2858.176302][T32658] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2858.195743][T32658] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2858.203989][T32658] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2858.211801][T32658] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2858.219612][T32658] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:42:06 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x14}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r5, r5, 0xffffffffffffffff, r5, r5, r5, r5, r5, 0xffffffffffffffff]}, 0x80) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r6, r6, 0xffffffffffffffff, r6, r6, r6, r6, r6, 0xffffffffffffffff]}, 0x80) (async) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNGETVNETHDRSZ(r10, 0x800454d7, &(0x7f0000000480)) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r11, r11, 0xffffffffffffffff, r11, r11, r11, r11, r11, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x5, &(0x7f0000000500)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0xd, &(0x7f00000005c0)=""/13, 0x20900, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x20005, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r9, r9, 0xffffffffffffffff, r11, r9, r9, r9, r9, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_ext={0x1c, 0xb, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@generic={0x1, 0xa, 0x5, 0x1, 0xffffc000}, @call={0x85, 0x0, 0x0, 0x2f}, @exit, @jmp={0x5, 0x0, 0xc, 0xb, 0x9, 0x6, 0xe}, @call={0x85, 0x0, 0x0, 0x4}, @ldst={0x2, 0x3, 0x1, 0xb, 0x5, 0x6, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @alu={0x7, 0x0, 0xc, 0x9, 0xa, 0x6, 0x4}]}, &(0x7f0000000180)='GPL\x00', 0xffff, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0xc, 0x7, 0x7fffffff}, 0x10, 0x305d9, r2, 0x0, &(0x7f0000000340)=[r3, r4, r0, r5, r6, r7, r8, r9]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r13) (async) close(r12) 07:42:06 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x21c0000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x21c0000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) (async) 07:42:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xdd, 0x10, 0x0}, 0x80) 07:42:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000001980000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) write$cgroup_pressure(r0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'pimreg\x00', @broadcast}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'pimreg\x00', @broadcast}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) 07:42:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xf0, 0x10, 0x0}, 0x80) 07:42:06 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 61) 07:42:06 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x14}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r5, r5, 0xffffffffffffffff, r5, r5, r5, r5, r5, 0xffffffffffffffff]}, 0x80) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r6, r6, 0xffffffffffffffff, r6, r6, r6, r6, r6, 0xffffffffffffffff]}, 0x80) (async) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETVNETHDRSZ(r10, 0x800454d7, &(0x7f0000000480)) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r11, r11, 0xffffffffffffffff, r11, r11, r11, r11, r11, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x5, &(0x7f0000000500)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0xd, &(0x7f00000005c0)=""/13, 0x20900, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x20005, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r9, r9, 0xffffffffffffffff, r11, r9, r9, r9, r9, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_ext={0x1c, 0xb, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@generic={0x1, 0xa, 0x5, 0x1, 0xffffc000}, @call={0x85, 0x0, 0x0, 0x2f}, @exit, @jmp={0x5, 0x0, 0xc, 0xb, 0x9, 0x6, 0xe}, @call={0x85, 0x0, 0x0, 0x4}, @ldst={0x2, 0x3, 0x1, 0xb, 0x5, 0x6, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @alu={0x7, 0x0, 0xc, 0x9, 0xa, 0x6, 0x4}]}, &(0x7f0000000180)='GPL\x00', 0xffff, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0xc, 0x7, 0x7fffffff}, 0x10, 0x305d9, r2, 0x0, &(0x7f0000000340)=[r3, r4, r0, r5, r6, r7, r8, r9]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r13) (async) close(r12) 07:42:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000ffffff9c0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2858.227424][T32658] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2858.235234][T32658] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2858.243051][T32658] 07:42:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x44, 0x0, 0x7, 0x5, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x1071}, 0x1000a, 0x0, 0x101, 0x5, 0xa35, 0x10000, 0x80, 0x0, 0x6, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) 07:42:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x44, 0x0, 0x7, 0x5, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x1071}, 0x1000a, 0x0, 0x101, 0x5, 0xa35, 0x10000, 0x80, 0x0, 0x6, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) 07:42:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000ffffff9f0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x105, 0x10, 0x0}, 0x80) [ 2858.299143][T32696] FAULT_INJECTION: forcing a failure. [ 2858.299143][T32696] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2858.346416][T32696] CPU: 1 PID: 32696 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2858.356486][T32696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2858.366380][T32696] Call Trace: [ 2858.369510][T32696] [ 2858.372284][T32696] dump_stack_lvl+0x151/0x1b7 [ 2858.376805][T32696] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2858.382092][T32696] dump_stack+0x15/0x17 [ 2858.386082][T32696] should_fail+0x3c0/0x510 [ 2858.390335][T32696] should_fail_alloc_page+0x58/0x70 [ 2858.395369][T32696] __alloc_pages+0x1de/0x7c0 [ 2858.399796][T32696] ? __count_vm_events+0x30/0x30 [ 2858.404571][T32696] ? __this_cpu_preempt_check+0x13/0x20 [ 2858.409949][T32696] ? __mod_node_page_state+0xac/0xf0 [ 2858.415072][T32696] pte_alloc_one+0x73/0x1b0 [ 2858.419410][T32696] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2858.424446][T32696] __pte_alloc+0x86/0x350 [ 2858.428625][T32696] ? free_pgtables+0x210/0x210 [ 2858.433208][T32696] ? _raw_spin_lock+0xa3/0x1b0 [ 2858.437811][T32696] ? _raw_spin_trylock_bh+0x1d0/0x1d0 07:42:06 executing program 3: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000040)) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x3}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r0, &(0x7f0000000080)="11ddae890578e3e9415d5058d361fa96e6de285d3458553958b5f9a49bae97e25c129406791976d9eba749000b25c5839119abe2d9be9d2181ade12a0f651562926dfb07509ee1913b9ef21d476842c355ddd46ca3af595db0745613f9d7ee7276ab536e4b6b9091362f35bf0f6369f00a1cb4c74e08dca552dc51360c2eabafc4def6c96fca2549365995743c9a5f20131c040bd4282de57e182b7e9543ce09a76de63395dd308ef706251bf4f4b278caa8f365bc82e55ab6d7f18f087b", &(0x7f0000000140)=""/42, 0x4}, 0x20) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x44, 0x0, 0x7, 0x5, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x1071}, 0x1000a, 0x0, 0x101, 0x5, 0xa35, 0x10000, 0x80, 0x0, 0x6, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) 07:42:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000b00000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400c80, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='bridge0\x00') close(r0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) 07:42:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000001ac5c80000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2858.443020][T32696] ? __kernel_text_address+0x9a/0x110 [ 2858.448227][T32696] copy_pte_range+0x1b1f/0x20b0 [ 2858.452916][T32696] ? __kunmap_atomic+0x80/0x80 [ 2858.457514][T32696] ? __kasan_slab_alloc+0xc4/0xe0 [ 2858.462375][T32696] ? __kasan_slab_alloc+0xb2/0xe0 [ 2858.467232][T32696] ? kmem_cache_alloc+0x189/0x2f0 [ 2858.472090][T32696] ? vm_area_dup+0x26/0x1d0 [ 2858.476435][T32696] ? dup_mmap+0x6b8/0xea0 [ 2858.480597][T32696] ? dup_mm+0x91/0x330 [ 2858.484503][T32696] ? copy_mm+0x108/0x1b0 [ 2858.488581][T32696] ? copy_process+0x1295/0x3250 [ 2858.493270][T32696] ? kernel_clone+0x22d/0x990 [ 2858.497784][T32696] ? __x64_sys_clone+0x289/0x310 [ 2858.502555][T32696] ? do_syscall_64+0x44/0xd0 [ 2858.506982][T32696] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2858.512887][T32696] copy_page_range+0xc1e/0x1090 [ 2858.517573][T32696] ? pfn_valid+0x1e0/0x1e0 [ 2858.521827][T32696] dup_mmap+0x99f/0xea0 [ 2858.525820][T32696] ? __delayed_free_task+0x20/0x20 [ 2858.530762][T32696] ? mm_init+0x807/0x960 [ 2858.534842][T32696] dup_mm+0x91/0x330 [ 2858.538572][T32696] copy_mm+0x108/0x1b0 [ 2858.542482][T32696] copy_process+0x1295/0x3250 [ 2858.546993][T32696] ? proc_fail_nth_write+0x213/0x290 [ 2858.552118][T32696] ? proc_fail_nth_read+0x220/0x220 [ 2858.557146][T32696] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2858.562094][T32696] ? vfs_write+0x9af/0x1050 [ 2858.566434][T32696] ? vmacache_update+0xb7/0x120 [ 2858.571120][T32696] kernel_clone+0x22d/0x990 [ 2858.575461][T32696] ? file_end_write+0x1b0/0x1b0 [ 2858.580145][T32696] ? __kasan_check_write+0x14/0x20 [ 2858.585094][T32696] ? create_io_thread+0x1e0/0x1e0 [ 2858.589955][T32696] ? __mutex_lock_slowpath+0x10/0x10 [ 2858.595075][T32696] __x64_sys_clone+0x289/0x310 [ 2858.599683][T32696] ? __do_sys_vfork+0x130/0x130 [ 2858.604363][T32696] ? debug_smp_processor_id+0x17/0x20 [ 2858.609571][T32696] do_syscall_64+0x44/0xd0 [ 2858.613826][T32696] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2858.619550][T32696] RIP: 0033:0x7f4243ed90d9 [ 2858.623805][T32696] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2858.643504][T32696] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2858.651751][T32696] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2858.659560][T32696] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2858.667376][T32696] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2858.675185][T32696] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2858.682996][T32696] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2858.690808][T32696] 07:42:07 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62) 07:42:07 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000dd0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x166, 0x10, 0x0}, 0x80) 07:42:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0xfffffca5) 07:42:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400c80, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)=0x1) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='bridge0\x00') close(r0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) 07:42:07 executing program 3: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000040)) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x3}, 0x10) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r0, &(0x7f0000000080)="11ddae890578e3e9415d5058d361fa96e6de285d3458553958b5f9a49bae97e25c129406791976d9eba749000b25c5839119abe2d9be9d2181ade12a0f651562926dfb07509ee1913b9ef21d476842c355ddd46ca3af595db0745613f9d7ee7276ab536e4b6b9091362f35bf0f6369f00a1cb4c74e08dca552dc51360c2eabafc4def6c96fca2549365995743c9a5f20131c040bd4282de57e182b7e9543ce09a76de63395dd308ef706251bf4f4b278caa8f365bc82e55ab6d7f18f087b", &(0x7f0000000140)=""/42, 0x4}, 0x20) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x195, 0x10, 0x0}, 0x80) 07:42:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400c80, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)=0x1) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='bridge0\x00') (async) close(r0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) 07:42:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0xfffffca5) 07:42:07 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000f00000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x198, 0x10, 0x0}, 0x80) 07:42:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0xfffffca5) [ 2858.764977][T32741] FAULT_INJECTION: forcing a failure. [ 2858.764977][T32741] name failslab, interval 1, probability 0, space 0, times 0 [ 2858.804796][T32741] CPU: 0 PID: 32741 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2858.814863][T32741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2858.824764][T32741] Call Trace: [ 2858.827882][T32741] [ 2858.830658][T32741] dump_stack_lvl+0x151/0x1b7 [ 2858.835176][T32741] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2858.840471][T32741] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2858.846715][T32741] dump_stack+0x15/0x17 [ 2858.850708][T32741] should_fail+0x3c0/0x510 [ 2858.854961][T32741] __should_failslab+0x9f/0xe0 [ 2858.859560][T32741] should_failslab+0x9/0x20 [ 2858.863899][T32741] kmem_cache_alloc+0x4f/0x2f0 [ 2858.868500][T32741] ? anon_vma_fork+0xf7/0x4f0 [ 2858.873011][T32741] anon_vma_fork+0xf7/0x4f0 [ 2858.877353][T32741] ? anon_vma_name+0x43/0x70 [ 2858.881779][T32741] dup_mmap+0x750/0xea0 [ 2858.885774][T32741] ? __delayed_free_task+0x20/0x20 [ 2858.890717][T32741] ? mm_init+0x807/0x960 [ 2858.894798][T32741] dup_mm+0x91/0x330 [ 2858.898534][T32741] copy_mm+0x108/0x1b0 [ 2858.902445][T32741] copy_process+0x1295/0x3250 [ 2858.906949][T32741] ? proc_fail_nth_write+0x213/0x290 [ 2858.912069][T32741] ? proc_fail_nth_read+0x220/0x220 [ 2858.917105][T32741] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2858.922048][T32741] ? vfs_write+0x9af/0x1050 [ 2858.926390][T32741] ? vmacache_update+0xb7/0x120 [ 2858.931078][T32741] kernel_clone+0x22d/0x990 [ 2858.935420][T32741] ? file_end_write+0x1b0/0x1b0 [ 2858.940100][T32741] ? __kasan_check_write+0x14/0x20 [ 2858.945051][T32741] ? create_io_thread+0x1e0/0x1e0 [ 2858.949908][T32741] ? __mutex_lock_slowpath+0x10/0x10 [ 2858.955030][T32741] __x64_sys_clone+0x289/0x310 [ 2858.959632][T32741] ? __do_sys_vfork+0x130/0x130 [ 2858.964322][T32741] ? debug_smp_processor_id+0x17/0x20 [ 2858.969527][T32741] do_syscall_64+0x44/0xd0 [ 2858.973780][T32741] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2858.979508][T32741] RIP: 0033:0x7f4243ed90d9 [ 2858.983765][T32741] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2859.003202][T32741] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 07:42:07 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) 07:42:07 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000003fb0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x4, 0x80, 0x4, 0x3, 0x8, 0x4, 0x0, 0x1, 0x400, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x3, 0x1}, 0x4001, 0x6, 0x8001, 0x3, 0x9091, 0x81, 0x5, 0x0, 0x1, 0x0, 0x8001}) close(r0) 07:42:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x209, 0x10, 0x0}, 0x80) 07:42:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x1, 0x4, [@broadcast, @local, @multicast, @remote]}) [ 2859.011447][T32741] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2859.019258][T32741] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2859.027066][T32741] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2859.034878][T32741] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2859.042690][T32741] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2859.050508][T32741] [ 2859.086561][ T301] FAULT_INJECTION: forcing a failure. [ 2859.086561][ T301] name failslab, interval 1, probability 0, space 0, times 0 [ 2859.104927][ T301] CPU: 1 PID: 301 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2859.114817][ T301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2859.124713][ T301] Call Trace: [ 2859.127837][ T301] [ 2859.130622][ T301] dump_stack_lvl+0x151/0x1b7 [ 2859.135128][ T301] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2859.140437][ T301] dump_stack+0x15/0x17 [ 2859.144412][ T301] should_fail+0x3c0/0x510 [ 2859.148666][ T301] __should_failslab+0x9f/0xe0 [ 2859.153266][ T301] should_failslab+0x9/0x20 [ 2859.157602][ T301] kmem_cache_alloc+0x4f/0x2f0 [ 2859.162200][ T301] ? anon_vma_fork+0x1b9/0x4f0 [ 2859.166801][ T301] anon_vma_fork+0x1b9/0x4f0 [ 2859.171229][ T301] dup_mmap+0x750/0xea0 [ 2859.175223][ T301] ? __delayed_free_task+0x20/0x20 [ 2859.180168][ T301] ? mm_init+0x807/0x960 [ 2859.184246][ T301] dup_mm+0x91/0x330 [ 2859.187978][ T301] copy_mm+0x108/0x1b0 [ 2859.191883][ T301] copy_process+0x1295/0x3250 [ 2859.196400][ T301] ? proc_fail_nth_write+0x213/0x290 [ 2859.201516][ T301] ? proc_fail_nth_read+0x220/0x220 [ 2859.206556][ T301] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2859.211499][ T301] ? vfs_write+0x9af/0x1050 [ 2859.215841][ T301] ? vmacache_update+0xb7/0x120 [ 2859.220526][ T301] kernel_clone+0x22d/0x990 [ 2859.225041][ T301] ? file_end_write+0x1b0/0x1b0 [ 2859.229727][ T301] ? __kasan_check_write+0x14/0x20 [ 2859.234673][ T301] ? create_io_thread+0x1e0/0x1e0 [ 2859.239533][ T301] ? __mutex_lock_slowpath+0x10/0x10 [ 2859.244656][ T301] __x64_sys_clone+0x289/0x310 [ 2859.249254][ T301] ? __do_sys_vfork+0x130/0x130 [ 2859.253944][ T301] ? debug_smp_processor_id+0x17/0x20 [ 2859.259148][ T301] do_syscall_64+0x44/0xd0 [ 2859.263402][ T301] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2859.269129][ T301] RIP: 0033:0x7f4243ed90d9 [ 2859.273386][ T301] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2859.292825][ T301] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2859.301157][ T301] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2859.308967][ T301] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2859.316864][ T301] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2859.324675][ T301] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:42:07 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000ff0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:07 executing program 3: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000040)) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x3}, 0x10) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r0, &(0x7f0000000080)="11ddae890578e3e9415d5058d361fa96e6de285d3458553958b5f9a49bae97e25c129406791976d9eba749000b25c5839119abe2d9be9d2181ade12a0f651562926dfb07509ee1913b9ef21d476842c355ddd46ca3af595db0745613f9d7ee7276ab536e4b6b9091362f35bf0f6369f00a1cb4c74e08dca552dc51360c2eabafc4def6c96fca2549365995743c9a5f20131c040bd4282de57e182b7e9543ce09a76de63395dd308ef706251bf4f4b278caa8f365bc82e55ab6d7f18f087b", &(0x7f0000000140)=""/42, 0x4}, 0x20) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x4, 0x80, 0x4, 0x3, 0x8, 0x4, 0x0, 0x1, 0x400, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x3, 0x1}, 0x4001, 0x6, 0x8001, 0x3, 0x9091, 0x81, 0x5, 0x0, 0x1, 0x0, 0x8001}) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x4, 0x80, 0x4, 0x3, 0x8, 0x4, 0x0, 0x1, 0x400, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x3, 0x1}, 0x4001, 0x6, 0x8001, 0x3, 0x9091, 0x81, 0x5, 0x0, 0x1, 0x0, 0x8001}) (async) close(r0) (async) 07:42:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x299, 0x10, 0x0}, 0x80) 07:42:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x1, 0x4, [@broadcast, @local, @multicast, @remote]}) 07:42:07 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000ffffffff0000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x300, 0x10, 0x0}, 0x80) [ 2859.332487][ T301] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2859.340299][ T301] 07:42:07 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) 07:42:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x1, 0x4, [@broadcast, @local, @multicast, @remote]}) 07:42:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x3fb, 0x10, 0x0}, 0x80) 07:42:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x4, 0x80, 0x4, 0x3, 0x8, 0x4, 0x0, 0x1, 0x400, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x3, 0x1}, 0x4001, 0x6, 0x8001, 0x3, 0x9091, 0x81, 0x5, 0x0, 0x1, 0x0, 0x8001}) (async) close(r0) 07:42:07 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000020000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400800, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'macvlan0\x00', 0x200}) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'cpuacct'}, {0x2b, 'cpuset'}, {0x6, 'memory'}, {0x2b, 'blkio'}, {0x2d, 'io'}, {0x2b, 'freezer'}, {0x6, 'freezer'}, {0x2d, 'io'}, {0x91ed557bc4d953e9, 'hugetlb'}]}, 0x43) close(r0) socketpair(0x3, 0x6, 0x31, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) 07:42:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x500, 0x10, 0x0}, 0x80) 07:42:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x4200, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0xffffffffffffffbb) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) write$cgroup_type(r1, &(0x7f0000000000), 0x9) 07:42:07 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000030000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x4200, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0xffffffffffffffbb) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) write$cgroup_type(r1, &(0x7f0000000000), 0x9) 07:42:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'cpuacct'}, {0x2b, 'cpuset'}, {0x6, 'memory'}, {0x2b, 'blkio'}, {0x2d, 'io'}, {0x2b, 'freezer'}, {0x6, 'freezer'}, {0x2d, 'io'}, {0x91ed557bc4d953e9, 'hugetlb'}]}, 0x43) close(r0) socketpair(0x3, 0x6, 0x31, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) [ 2859.452303][ T340] FAULT_INJECTION: forcing a failure. [ 2859.452303][ T340] name failslab, interval 1, probability 0, space 0, times 0 [ 2859.473577][ T340] CPU: 1 PID: 340 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2859.483476][ T340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2859.493372][ T340] Call Trace: [ 2859.496495][ T340] [ 2859.499270][ T340] dump_stack_lvl+0x151/0x1b7 [ 2859.503782][ T340] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2859.509086][ T340] dump_stack+0x15/0x17 [ 2859.513075][ T340] should_fail+0x3c0/0x510 [ 2859.517327][ T340] __should_failslab+0x9f/0xe0 [ 2859.521921][ T340] should_failslab+0x9/0x20 [ 2859.526263][ T340] kmem_cache_alloc+0x4f/0x2f0 [ 2859.530861][ T340] ? vm_area_dup+0x26/0x1d0 [ 2859.535204][ T340] vm_area_dup+0x26/0x1d0 [ 2859.539364][ T340] dup_mmap+0x6b8/0xea0 [ 2859.543357][ T340] ? __delayed_free_task+0x20/0x20 [ 2859.548302][ T340] ? mm_init+0x807/0x960 [ 2859.552385][ T340] dup_mm+0x91/0x330 [ 2859.556114][ T340] copy_mm+0x108/0x1b0 [ 2859.560021][ T340] copy_process+0x1295/0x3250 [ 2859.564532][ T340] ? proc_fail_nth_write+0x213/0x290 [ 2859.569653][ T340] ? proc_fail_nth_read+0x220/0x220 [ 2859.574689][ T340] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2859.579634][ T340] ? vfs_write+0x9af/0x1050 [ 2859.583974][ T340] ? vmacache_update+0xb7/0x120 [ 2859.588662][ T340] kernel_clone+0x22d/0x990 [ 2859.592999][ T340] ? file_end_write+0x1b0/0x1b0 [ 2859.597695][ T340] ? __kasan_check_write+0x14/0x20 [ 2859.602634][ T340] ? create_io_thread+0x1e0/0x1e0 [ 2859.607496][ T340] ? __mutex_lock_slowpath+0x10/0x10 [ 2859.612616][ T340] __x64_sys_clone+0x289/0x310 [ 2859.617216][ T340] ? __do_sys_vfork+0x130/0x130 [ 2859.621901][ T340] ? debug_smp_processor_id+0x17/0x20 [ 2859.627113][ T340] do_syscall_64+0x44/0xd0 [ 2859.631364][ T340] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2859.637089][ T340] RIP: 0033:0x7f4243ed90d9 [ 2859.641345][ T340] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2859.660783][ T340] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2859.669029][ T340] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2859.676841][ T340] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2859.684651][ T340] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2859.692463][ T340] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:42:08 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) 07:42:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000040000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400800, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'macvlan0\x00', 0x200}) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400800, 0x0) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'macvlan0\x00', 0x200}) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) 07:42:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x501, 0x10, 0x0}, 0x80) 07:42:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x4200, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0xffffffffffffffbb) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) write$cgroup_type(r1, &(0x7f0000000000), 0x9) 07:42:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'cpuacct'}, {0x2b, 'cpuset'}, {0x6, 'memory'}, {0x2b, 'blkio'}, {0x2d, 'io'}, {0x2b, 'freezer'}, {0x6, 'freezer'}, {0x2d, 'io'}, {0x91ed557bc4d953e9, 'hugetlb'}]}, 0x43) close(r0) socketpair(0x3, 0x6, 0x31, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'cpuacct'}, {0x2b, 'cpuset'}, {0x6, 'memory'}, {0x2b, 'blkio'}, {0x2d, 'io'}, {0x2b, 'freezer'}, {0x6, 'freezer'}, {0x2d, 'io'}, {0x91ed557bc4d953e9, 'hugetlb'}]}, 0x43) (async) close(r0) (async) socketpair(0x3, 0x6, 0x31, &(0x7f0000000000)) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) (async) 07:42:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000050000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2859.700275][ T340] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2859.708087][ T340] [ 2859.725438][ T356] FAULT_INJECTION: forcing a failure. [ 2859.725438][ T356] name failslab, interval 1, probability 0, space 0, times 0 [ 2859.739087][ T356] CPU: 1 PID: 356 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 07:42:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x600, 0x10, 0x0}, 0x80) 07:42:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000060000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x700, 0x10, 0x0}, 0x80) 07:42:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000070000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2859.748963][ T356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2859.758860][ T356] Call Trace: [ 2859.761985][ T356] [ 2859.764760][ T356] dump_stack_lvl+0x151/0x1b7 [ 2859.769276][ T356] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2859.774572][ T356] dump_stack+0x15/0x17 [ 2859.778560][ T356] should_fail+0x3c0/0x510 [ 2859.782813][ T356] __should_failslab+0x9f/0xe0 [ 2859.787415][ T356] should_failslab+0x9/0x20 [ 2859.791754][ T356] kmem_cache_alloc+0x4f/0x2f0 [ 2859.796355][ T356] ? vm_area_dup+0x26/0x1d0 07:42:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x900, 0x10, 0x0}, 0x80) [ 2859.800696][ T356] vm_area_dup+0x26/0x1d0 [ 2859.804861][ T356] dup_mmap+0x6b8/0xea0 [ 2859.808851][ T356] ? __delayed_free_task+0x20/0x20 [ 2859.813800][ T356] ? mm_init+0x807/0x960 [ 2859.817880][ T356] dup_mm+0x91/0x330 [ 2859.821610][ T356] copy_mm+0x108/0x1b0 [ 2859.825514][ T356] copy_process+0x1295/0x3250 [ 2859.830026][ T356] ? proc_fail_nth_write+0x213/0x290 [ 2859.835148][ T356] ? proc_fail_nth_read+0x220/0x220 [ 2859.840184][ T356] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2859.845133][ T356] ? vfs_write+0x9af/0x1050 [ 2859.849468][ T356] ? vmacache_update+0xb7/0x120 [ 2859.854154][ T356] kernel_clone+0x22d/0x990 [ 2859.858490][ T356] ? file_end_write+0x1b0/0x1b0 [ 2859.863176][ T356] ? __kasan_check_write+0x14/0x20 [ 2859.868125][ T356] ? create_io_thread+0x1e0/0x1e0 [ 2859.872985][ T356] ? __mutex_lock_slowpath+0x10/0x10 [ 2859.878106][ T356] __x64_sys_clone+0x289/0x310 [ 2859.882797][ T356] ? __do_sys_vfork+0x130/0x130 [ 2859.887482][ T356] ? debug_smp_processor_id+0x17/0x20 [ 2859.892688][ T356] do_syscall_64+0x44/0xd0 [ 2859.896941][ T356] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2859.902671][ T356] RIP: 0033:0x7f4243ed90d9 [ 2859.906921][ T356] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2859.926362][ T356] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2859.934606][ T356] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2859.942421][ T356] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 07:42:08 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) 07:42:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000080000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400800, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'macvlan0\x00', 0x200}) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x902, 0x10, 0x0}, 0x80) 07:42:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x40002, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) 07:42:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x40002, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) [ 2859.950228][ T356] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2859.958040][ T356] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2859.965851][ T356] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2859.973670][ T356] [ 2859.994028][ T391] FAULT_INJECTION: forcing a failure. 07:42:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) close(r1) (async) close(r0) (async) 07:42:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000090000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x40002, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) write$cgroup_pressure(r0, 0x0, 0x0) [ 2859.994028][ T391] name failslab, interval 1, probability 0, space 0, times 0 [ 2860.012093][ T391] CPU: 1 PID: 391 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2860.021978][ T391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2860.031873][ T391] Call Trace: [ 2860.035002][ T391] [ 2860.037773][ T391] dump_stack_lvl+0x151/0x1b7 [ 2860.042286][ T391] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2860.047583][ T391] ? do_syscall_64+0x44/0xd0 [ 2860.052014][ T391] dump_stack+0x15/0x17 [ 2860.055999][ T391] should_fail+0x3c0/0x510 [ 2860.060253][ T391] __should_failslab+0x9f/0xe0 [ 2860.064850][ T391] should_failslab+0x9/0x20 [ 2860.069190][ T391] kmem_cache_alloc+0x4f/0x2f0 [ 2860.073791][ T391] ? anon_vma_clone+0xa1/0x4f0 [ 2860.078392][ T391] anon_vma_clone+0xa1/0x4f0 [ 2860.082819][ T391] anon_vma_fork+0x91/0x4f0 [ 2860.087158][ T391] ? anon_vma_name+0x43/0x70 [ 2860.091582][ T391] dup_mmap+0x750/0xea0 [ 2860.095576][ T391] ? __delayed_free_task+0x20/0x20 [ 2860.100523][ T391] ? mm_init+0x807/0x960 [ 2860.104601][ T391] dup_mm+0x91/0x330 [ 2860.108331][ T391] copy_mm+0x108/0x1b0 [ 2860.112240][ T391] copy_process+0x1295/0x3250 [ 2860.116751][ T391] ? proc_fail_nth_write+0x213/0x290 [ 2860.121872][ T391] ? proc_fail_nth_read+0x220/0x220 [ 2860.127339][ T391] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2860.132290][ T391] ? vfs_write+0x9af/0x1050 [ 2860.136627][ T391] ? vmacache_update+0xb7/0x120 [ 2860.141314][ T391] kernel_clone+0x22d/0x990 [ 2860.145652][ T391] ? file_end_write+0x1b0/0x1b0 [ 2860.150339][ T391] ? __kasan_check_write+0x14/0x20 [ 2860.155288][ T391] ? create_io_thread+0x1e0/0x1e0 [ 2860.160147][ T391] ? __mutex_lock_slowpath+0x10/0x10 [ 2860.165266][ T391] __x64_sys_clone+0x289/0x310 [ 2860.169868][ T391] ? __do_sys_vfork+0x130/0x130 [ 2860.174555][ T391] ? debug_smp_processor_id+0x17/0x20 [ 2860.179762][ T391] do_syscall_64+0x44/0xd0 [ 2860.184015][ T391] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2860.189741][ T391] RIP: 0033:0x7f4243ed90d9 [ 2860.193997][ T391] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2860.213437][ T391] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2860.221679][ T391] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2860.229491][ T391] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2860.237303][ T391] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2860.245116][ T391] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:42:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xa00, 0x10, 0x0}, 0x80) 07:42:08 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) 07:42:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000a0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) 07:42:08 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x17, 0x80000001, 0xfff, 0x1000, 0x844, 0xffffffffffffffff, 0x91f, '\x00', r0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.numa_stat\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000440)=0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r1, 0x4) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xb00, 0x10, 0x0}, 0x80) [ 2860.252925][ T391] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2860.260740][ T391] 07:42:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) write$cgroup_pressure(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) 07:42:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000b0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) write$cgroup_pressure(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) 07:42:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xc00, 0x10, 0x0}, 0x80) 07:42:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) 07:42:08 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x17, 0x80000001, 0xfff, 0x1000, 0x844, 0xffffffffffffffff, 0x91f, '\x00', r0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0x48) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.numa_stat\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000440)=0x1) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r1, 0x4) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xd00, 0x10, 0x0}, 0x80) [ 2860.335426][ T443] FAULT_INJECTION: forcing a failure. [ 2860.335426][ T443] name failslab, interval 1, probability 0, space 0, times 0 [ 2860.371205][ T443] CPU: 1 PID: 443 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2860.381103][ T443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2860.391003][ T443] Call Trace: [ 2860.394117][ T443] [ 2860.396899][ T443] dump_stack_lvl+0x151/0x1b7 [ 2860.401409][ T443] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2860.406706][ T443] dump_stack+0x15/0x17 [ 2860.410693][ T443] should_fail+0x3c0/0x510 [ 2860.414951][ T443] __should_failslab+0x9f/0xe0 [ 2860.419551][ T443] should_failslab+0x9/0x20 [ 2860.423889][ T443] kmem_cache_alloc+0x4f/0x2f0 [ 2860.428663][ T443] ? anon_vma_clone+0xa1/0x4f0 [ 2860.433262][ T443] anon_vma_clone+0xa1/0x4f0 [ 2860.437688][ T443] anon_vma_fork+0x91/0x4f0 [ 2860.442026][ T443] ? anon_vma_name+0x43/0x70 [ 2860.446453][ T443] dup_mmap+0x750/0xea0 [ 2860.450449][ T443] ? __delayed_free_task+0x20/0x20 [ 2860.455392][ T443] ? mm_init+0x807/0x960 [ 2860.459471][ T443] dup_mm+0x91/0x330 [ 2860.463204][ T443] copy_mm+0x108/0x1b0 [ 2860.467115][ T443] copy_process+0x1295/0x3250 [ 2860.471622][ T443] ? proc_fail_nth_write+0x213/0x290 [ 2860.476745][ T443] ? proc_fail_nth_read+0x220/0x220 [ 2860.481776][ T443] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2860.486723][ T443] ? vfs_write+0x9af/0x1050 [ 2860.491062][ T443] ? vmacache_update+0xb7/0x120 [ 2860.495749][ T443] kernel_clone+0x22d/0x990 [ 2860.500089][ T443] ? file_end_write+0x1b0/0x1b0 [ 2860.504775][ T443] ? __kasan_check_write+0x14/0x20 [ 2860.509724][ T443] ? create_io_thread+0x1e0/0x1e0 [ 2860.514584][ T443] ? __mutex_lock_slowpath+0x10/0x10 [ 2860.519707][ T443] __x64_sys_clone+0x289/0x310 [ 2860.524304][ T443] ? __do_sys_vfork+0x130/0x130 [ 2860.528993][ T443] ? debug_smp_processor_id+0x17/0x20 [ 2860.534199][ T443] do_syscall_64+0x44/0xd0 [ 2860.538452][ T443] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2860.544184][ T443] RIP: 0033:0x7f4243ed90d9 [ 2860.548434][ T443] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2860.567873][ T443] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2860.576117][ T443] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 07:42:08 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) 07:42:08 executing program 0: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000380)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002060000000000ebff010000852000000300000018000000040000000000000003000000186700000d00000000000000ffff00001836000005000000000000000000000095000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x40, 0x9f, &(0x7f00000000c0)=""/159, 0x41100, 0x14, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xc, 0x10001, 0x20}, 0x10}, 0x80) write$cgroup_pressure(r0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000340)={'ip6gre0\x00', 0x600}) 07:42:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xe00, 0x10, 0x0}, 0x80) 07:42:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async, rerun: 32) close(r0) (rerun: 32) 07:42:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000c0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:08 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x17, 0x80000001, 0xfff, 0x1000, 0x844, 0xffffffffffffffff, 0x91f, '\x00', r0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.numa_stat\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000440)=0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r1, 0x4) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x17, 0x80000001, 0xfff, 0x1000, 0x844, 0xffffffffffffffff, 0x91f, '\x00', r0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0x48) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.numa_stat\x00', 0x0, 0x0) (async) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000440)=0x1) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r1, 0x4) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) [ 2860.583934][ T443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2860.591741][ T443] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2860.599552][ T443] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2860.607365][ T443] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2860.615176][ T443] 07:42:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r0) 07:42:09 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000d0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:09 executing program 0: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000380)) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002060000000000ebff010000852000000300000018000000040000000000000003000000186700000d00000000000000ffff00001836000005000000000000000000000095000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x40, 0x9f, &(0x7f00000000c0)=""/159, 0x41100, 0x14, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xc, 0x10001, 0x20}, 0x10}, 0x80) write$cgroup_pressure(r0, 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000340)={'ip6gre0\x00', 0x600}) 07:42:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x1100, 0x10, 0x0}, 0x80) 07:42:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x1200, 0x10, 0x0}, 0x80) 07:42:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x10b000, 0x0) 07:42:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x1800, 0x10, 0x0}, 0x80) [ 2860.651356][ T479] FAULT_INJECTION: forcing a failure. [ 2860.651356][ T479] name failslab, interval 1, probability 0, space 0, times 0 [ 2860.665112][ T479] CPU: 0 PID: 479 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2860.675003][ T479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2860.684895][ T479] Call Trace: [ 2860.688021][ T479] [ 2860.690797][ T479] dump_stack_lvl+0x151/0x1b7 [ 2860.695312][ T479] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2860.700607][ T479] dump_stack+0x15/0x17 [ 2860.704600][ T479] should_fail+0x3c0/0x510 [ 2860.708852][ T479] __should_failslab+0x9f/0xe0 [ 2860.713511][ T479] should_failslab+0x9/0x20 [ 2860.717791][ T479] kmem_cache_alloc+0x4f/0x2f0 [ 2860.722389][ T479] ? vm_area_dup+0x26/0x1d0 [ 2860.726743][ T479] vm_area_dup+0x26/0x1d0 [ 2860.730891][ T479] dup_mmap+0x6b8/0xea0 [ 2860.734885][ T479] ? __delayed_free_task+0x20/0x20 [ 2860.739833][ T479] ? mm_init+0x807/0x960 [ 2860.743909][ T479] dup_mm+0x91/0x330 [ 2860.747643][ T479] copy_mm+0x108/0x1b0 [ 2860.751550][ T479] copy_process+0x1295/0x3250 [ 2860.756068][ T479] ? proc_fail_nth_write+0x213/0x290 [ 2860.761184][ T479] ? proc_fail_nth_read+0x220/0x220 [ 2860.766219][ T479] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2860.771169][ T479] ? vfs_write+0x9af/0x1050 [ 2860.775502][ T479] ? vmacache_update+0xb7/0x120 [ 2860.780192][ T479] kernel_clone+0x22d/0x990 [ 2860.784528][ T479] ? file_end_write+0x1b0/0x1b0 [ 2860.789217][ T479] ? __kasan_check_write+0x14/0x20 [ 2860.794164][ T479] ? create_io_thread+0x1e0/0x1e0 [ 2860.799022][ T479] ? __mutex_lock_slowpath+0x10/0x10 [ 2860.804143][ T479] __x64_sys_clone+0x289/0x310 [ 2860.808753][ T479] ? __do_sys_vfork+0x130/0x130 [ 2860.813437][ T479] ? debug_smp_processor_id+0x17/0x20 [ 2860.818645][ T479] do_syscall_64+0x44/0xd0 [ 2860.822889][ T479] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2860.828618][ T479] RIP: 0033:0x7f4243ed90d9 [ 2860.832871][ T479] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2860.855524][ T479] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2860.863774][ T479] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2860.871582][ T479] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2860.879392][ T479] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2860.887203][ T479] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:42:09 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) 07:42:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x10b000, 0x0) 07:42:09 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000e0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x2000, 0x10, 0x0}, 0x80) 07:42:09 executing program 0: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000380)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002060000000000ebff010000852000000300000018000000040000000000000003000000186700000d00000000000000ffff00001836000005000000000000000000000095000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x40, 0x9f, &(0x7f00000000c0)=""/159, 0x41100, 0x14, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xc, 0x10001, 0x20}, 0x10}, 0x80) write$cgroup_pressure(r0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000340)={'ip6gre0\x00', 0x600}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000380)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x58, &(0x7f0000000180)}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002060000000000ebff010000852000000300000018000000040000000000000003000000186700000d00000000000000ffff00001836000005000000000000000000000095000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x40, 0x9f, &(0x7f00000000c0)=""/159, 0x41100, 0x14, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xc, 0x10001, 0x20}, 0x10}, 0x80) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000340)={'ip6gre0\x00', 0x600}) (async) 07:42:09 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x3, 0x80, 0x2, 0x7f, 0x0, 0x6, 0x0, 0x8001, 0x50841, 0xe, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x9, 0x5, 0x5, 0x2, 0x6, 0x4, 0x65, 0x0, 0x1000, 0x0, 0xfffffffffffffe01}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup=r0, 0xffffffffffffffff, 0x25}, 0x10) 07:42:09 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000f0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2860.895014][ T479] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2860.902828][ T479] 07:42:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x2500, 0x10, 0x0}, 0x80) 07:42:09 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.kill\x00', 0x0, 0x0) write$cgroup_pressure(r1, &(0x7f00000000c0)={'full', 0x20, 0x231, 0x20, 0x100000001}, 0x2f) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r2, 0x0, 0x0) 07:42:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x10b000, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x10b000, 0x0) (async) 07:42:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4000, 0x10, 0x0}, 0x80) 07:42:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4800, 0x10, 0x0}, 0x80) [ 2860.960008][ T530] FAULT_INJECTION: forcing a failure. [ 2860.960008][ T530] name failslab, interval 1, probability 0, space 0, times 0 [ 2860.981606][ T530] CPU: 0 PID: 530 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2860.991496][ T530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2861.001395][ T530] Call Trace: [ 2861.004517][ T530] [ 2861.007293][ T530] dump_stack_lvl+0x151/0x1b7 [ 2861.011803][ T530] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2861.017098][ T530] dump_stack+0x15/0x17 [ 2861.021086][ T530] should_fail+0x3c0/0x510 [ 2861.025342][ T530] __should_failslab+0x9f/0xe0 [ 2861.029941][ T530] should_failslab+0x9/0x20 [ 2861.034282][ T530] kmem_cache_alloc+0x4f/0x2f0 [ 2861.038880][ T530] ? vm_area_dup+0x26/0x1d0 [ 2861.043221][ T530] vm_area_dup+0x26/0x1d0 [ 2861.047388][ T530] dup_mmap+0x6b8/0xea0 [ 2861.051379][ T530] ? __delayed_free_task+0x20/0x20 [ 2861.056325][ T530] ? mm_init+0x807/0x960 [ 2861.060405][ T530] dup_mm+0x91/0x330 [ 2861.064136][ T530] copy_mm+0x108/0x1b0 [ 2861.068041][ T530] copy_process+0x1295/0x3250 [ 2861.072556][ T530] ? proc_fail_nth_write+0x213/0x290 [ 2861.077675][ T530] ? proc_fail_nth_read+0x220/0x220 [ 2861.082710][ T530] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2861.087658][ T530] ? vfs_write+0x9af/0x1050 [ 2861.091996][ T530] ? vmacache_update+0xb7/0x120 [ 2861.096684][ T530] kernel_clone+0x22d/0x990 [ 2861.101023][ T530] ? file_end_write+0x1b0/0x1b0 [ 2861.105708][ T530] ? __kasan_check_write+0x14/0x20 [ 2861.110660][ T530] ? create_io_thread+0x1e0/0x1e0 [ 2861.115516][ T530] ? __mutex_lock_slowpath+0x10/0x10 [ 2861.120636][ T530] __x64_sys_clone+0x289/0x310 [ 2861.125238][ T530] ? __do_sys_vfork+0x130/0x130 [ 2861.129936][ T530] ? debug_smp_processor_id+0x17/0x20 [ 2861.135133][ T530] do_syscall_64+0x44/0xd0 [ 2861.139387][ T530] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2861.145123][ T530] RIP: 0033:0x7f4243ed90d9 [ 2861.149367][ T530] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2861.168807][ T530] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2861.177051][ T530] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2861.184864][ T530] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2861.192674][ T530] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2861.200485][ T530] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:42:09 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) 07:42:09 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.kill\x00', 0x0, 0x0) write$cgroup_pressure(r1, &(0x7f00000000c0)={'full', 0x20, 0x231, 0x20, 0x100000001}, 0x2f) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.kill\x00', 0x0, 0x0) (async) write$cgroup_pressure(r1, &(0x7f00000000c0)={'full', 0x20, 0x231, 0x20, 0x100000001}, 0x2f) (async) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$cgroup_pressure(r2, 0x0, 0x0) (async) 07:42:09 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000100000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:09 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x3, 0x80, 0x2, 0x7f, 0x0, 0x6, 0x0, 0x8001, 0x50841, 0xe, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x9, 0x5, 0x5, 0x2, 0x6, 0x4, 0x65, 0x0, 0x1000, 0x0, 0xfffffffffffffe01}) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup=r0, 0xffffffffffffffff, 0x25}, 0x10) 07:42:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r4, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=r2, 0xffffffffffffffff, 0x22, 0x4, r5}, 0x14) 07:42:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c00, 0x10, 0x0}, 0x80) 07:42:09 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000110000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:09 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async, rerun: 32) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.kill\x00', 0x0, 0x0) (rerun: 32) write$cgroup_pressure(r1, &(0x7f00000000c0)={'full', 0x20, 0x231, 0x20, 0x100000001}, 0x2f) (async) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) (async, rerun: 32) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (rerun: 32) write$cgroup_pressure(r2, 0x0, 0x0) 07:42:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x6400, 0x10, 0x0}, 0x80) 07:42:09 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x3, 0x80, 0x2, 0x7f, 0x0, 0x6, 0x0, 0x8001, 0x50841, 0xe, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x9, 0x5, 0x5, 0x2, 0x6, 0x4, 0x65, 0x0, 0x1000, 0x0, 0xfffffffffffffe01}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup=r0, 0xffffffffffffffff, 0x25}, 0x10) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(r1) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x3, 0x80, 0x2, 0x7f, 0x0, 0x6, 0x0, 0x8001, 0x50841, 0xe, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x9, 0x5, 0x5, 0x2, 0x6, 0x4, 0x65, 0x0, 0x1000, 0x0, 0xfffffffffffffe01}) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup=r0, 0xffffffffffffffff, 0x25}, 0x10) (async) [ 2861.208299][ T530] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2861.216114][ T530] 07:42:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async, rerun: 32) close(r0) (async, rerun: 32) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) (async, rerun: 64) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r4, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=r2, 0xffffffffffffffff, 0x22, 0x4, r5}, 0x14) 07:42:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)={r1}, 0x4) [ 2861.261667][ T563] FAULT_INJECTION: forcing a failure. [ 2861.261667][ T563] name failslab, interval 1, probability 0, space 0, times 0 [ 2861.294100][ T563] CPU: 0 PID: 563 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2861.304007][ T563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2861.313899][ T563] Call Trace: [ 2861.317024][ T563] [ 2861.319803][ T563] dump_stack_lvl+0x151/0x1b7 [ 2861.324316][ T563] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2861.329612][ T563] dump_stack+0x15/0x17 [ 2861.333598][ T563] should_fail+0x3c0/0x510 [ 2861.337850][ T563] __should_failslab+0x9f/0xe0 [ 2861.342450][ T563] should_failslab+0x9/0x20 [ 2861.346789][ T563] kmem_cache_alloc+0x4f/0x2f0 [ 2861.351389][ T563] ? anon_vma_fork+0x1b9/0x4f0 [ 2861.355988][ T563] anon_vma_fork+0x1b9/0x4f0 [ 2861.360415][ T563] dup_mmap+0x750/0xea0 [ 2861.364410][ T563] ? __delayed_free_task+0x20/0x20 [ 2861.369354][ T563] ? mm_init+0x807/0x960 [ 2861.373434][ T563] dup_mm+0x91/0x330 [ 2861.377166][ T563] copy_mm+0x108/0x1b0 [ 2861.381073][ T563] copy_process+0x1295/0x3250 [ 2861.385587][ T563] ? proc_fail_nth_write+0x213/0x290 [ 2861.390706][ T563] ? proc_fail_nth_read+0x220/0x220 [ 2861.395739][ T563] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2861.400686][ T563] ? vfs_write+0x9af/0x1050 [ 2861.405030][ T563] ? vmacache_update+0xb7/0x120 [ 2861.409712][ T563] kernel_clone+0x22d/0x990 [ 2861.414052][ T563] ? file_end_write+0x1b0/0x1b0 [ 2861.418742][ T563] ? __kasan_check_write+0x14/0x20 [ 2861.423687][ T563] ? create_io_thread+0x1e0/0x1e0 [ 2861.428547][ T563] ? __mutex_lock_slowpath+0x10/0x10 [ 2861.433667][ T563] __x64_sys_clone+0x289/0x310 [ 2861.438267][ T563] ? __do_sys_vfork+0x130/0x130 [ 2861.442954][ T563] ? debug_smp_processor_id+0x17/0x20 [ 2861.448160][ T563] do_syscall_64+0x44/0xd0 [ 2861.452413][ T563] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2861.458143][ T563] RIP: 0033:0x7f4243ed90d9 [ 2861.462398][ T563] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2861.481842][ T563] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2861.490081][ T563] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2861.497891][ T563] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 07:42:09 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) 07:42:09 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)=r2) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r4, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=r2, 0xffffffffffffffff, 0x22, 0x4, r5}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r2, r2, 0xffffffffffffffff, r2, r2, r2, r2, r2, 0xffffffffffffffff]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r4, r4, 0xffffffffffffffff, r4, r4, r4, r4, r4, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r4, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r5, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=r2, 0xffffffffffffffff, 0x22, 0x4, r5}, 0x14) (async) 07:42:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)={r1}, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)={r1}, 0x4) (async) 07:42:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x6601, 0x10, 0x0}, 0x80) 07:42:09 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000120000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:09 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000180000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2861.505836][ T563] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2861.513642][ T563] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2861.521544][ T563] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2861.529358][ T563] 07:42:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x6800, 0x10, 0x0}, 0x80) 07:42:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)={r1}, 0x4) 07:42:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) close(r1) close(r0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) 07:42:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) [ 2861.558779][ T597] FAULT_INJECTION: forcing a failure. [ 2861.558779][ T597] name failslab, interval 1, probability 0, space 0, times 0 [ 2861.575669][ T597] CPU: 0 PID: 597 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2861.585556][ T597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2861.595451][ T597] Call Trace: [ 2861.598577][ T597] [ 2861.601351][ T597] dump_stack_lvl+0x151/0x1b7 07:42:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) close(r1) close(r0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) close(r1) (async) close(r0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) (async) [ 2861.605868][ T597] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2861.611166][ T597] dump_stack+0x15/0x17 [ 2861.615152][ T597] should_fail+0x3c0/0x510 [ 2861.619407][ T597] __should_failslab+0x9f/0xe0 [ 2861.624005][ T597] should_failslab+0x9/0x20 [ 2861.628346][ T597] kmem_cache_alloc+0x4f/0x2f0 [ 2861.632944][ T597] ? vm_area_dup+0x26/0x1d0 [ 2861.637285][ T597] vm_area_dup+0x26/0x1d0 [ 2861.641452][ T597] dup_mmap+0x6b8/0xea0 [ 2861.645442][ T597] ? __delayed_free_task+0x20/0x20 [ 2861.650385][ T597] ? mm_init+0x807/0x960 [ 2861.654463][ T597] dup_mm+0x91/0x330 [ 2861.658201][ T597] copy_mm+0x108/0x1b0 [ 2861.662106][ T597] copy_process+0x1295/0x3250 [ 2861.666617][ T597] ? proc_fail_nth_write+0x213/0x290 [ 2861.671739][ T597] ? proc_fail_nth_read+0x220/0x220 [ 2861.676772][ T597] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2861.681716][ T597] ? vfs_write+0x9af/0x1050 [ 2861.686057][ T597] ? vmacache_update+0xb7/0x120 [ 2861.690743][ T597] kernel_clone+0x22d/0x990 [ 2861.695083][ T597] ? file_end_write+0x1b0/0x1b0 [ 2861.699768][ T597] ? __kasan_check_write+0x14/0x20 [ 2861.704716][ T597] ? create_io_thread+0x1e0/0x1e0 [ 2861.709577][ T597] ? __mutex_lock_slowpath+0x10/0x10 [ 2861.714698][ T597] __x64_sys_clone+0x289/0x310 [ 2861.719300][ T597] ? __do_sys_vfork+0x130/0x130 [ 2861.723986][ T597] ? debug_smp_processor_id+0x17/0x20 [ 2861.729191][ T597] do_syscall_64+0x44/0xd0 [ 2861.733448][ T597] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2861.739173][ T597] RIP: 0033:0x7f4243ed90d9 [ 2861.743428][ T597] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2861.762865][ T597] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2861.771112][ T597] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2861.778922][ T597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2861.786733][ T597] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2861.794544][ T597] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:42:10 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) 07:42:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) openat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) (async) 07:42:10 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)=r2) (async, rerun: 32) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (rerun: 32) 07:42:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) close(r1) close(r0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) close(r1) (async) close(r0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) (async) 07:42:10 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x6c00, 0x10, 0x0}, 0x80) 07:42:10 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000250000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:10 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000003c0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) (async, rerun: 64) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (rerun: 64) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) [ 2861.802378][ T597] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2861.810170][ T597] 07:42:10 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x7400, 0x10, 0x0}, 0x80) 07:42:10 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000480000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:10 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x7a00, 0x10, 0x0}, 0x80) 07:42:10 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000004c0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2861.857443][ T645] FAULT_INJECTION: forcing a failure. [ 2861.857443][ T645] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2861.881674][ T645] CPU: 1 PID: 645 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2861.891574][ T645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2861.901463][ T645] Call Trace: [ 2861.904588][ T645] [ 2861.907365][ T645] dump_stack_lvl+0x151/0x1b7 [ 2861.911879][ T645] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2861.917172][ T645] ? stack_trace_save+0x12d/0x1f0 [ 2861.922031][ T645] ? stack_trace_snprint+0x100/0x100 [ 2861.927150][ T645] dump_stack+0x15/0x17 [ 2861.931142][ T645] should_fail+0x3c0/0x510 [ 2861.935393][ T645] should_fail_alloc_page+0x58/0x70 [ 2861.940427][ T645] __alloc_pages+0x1de/0x7c0 [ 2861.944854][ T645] ? vm_area_dup+0x26/0x1d0 [ 2861.949193][ T645] ? copy_mm+0x108/0x1b0 [ 2861.953273][ T645] ? __count_vm_events+0x30/0x30 [ 2861.958048][ T645] ? memset+0x35/0x40 [ 2861.961864][ T645] ? copy_page_range+0xed3/0x1090 [ 2861.966727][ T645] allocate_slab+0x62/0x580 [ 2861.971065][ T645] ___slab_alloc+0x2e2/0x6f0 [ 2861.975491][ T645] ? vm_area_dup+0x26/0x1d0 [ 2861.979831][ T645] ? vm_area_dup+0x26/0x1d0 [ 2861.984171][ T645] __slab_alloc+0x4a/0x90 [ 2861.988339][ T645] kmem_cache_alloc+0x205/0x2f0 [ 2861.993029][ T645] ? vm_area_dup+0x26/0x1d0 [ 2861.997364][ T645] vm_area_dup+0x26/0x1d0 [ 2862.001530][ T645] dup_mmap+0x6b8/0xea0 [ 2862.005523][ T645] ? __delayed_free_task+0x20/0x20 [ 2862.010470][ T645] ? mm_init+0x807/0x960 [ 2862.014550][ T645] dup_mm+0x91/0x330 [ 2862.018280][ T645] copy_mm+0x108/0x1b0 [ 2862.022186][ T645] copy_process+0x1295/0x3250 [ 2862.026701][ T645] ? proc_fail_nth_write+0x213/0x290 [ 2862.031820][ T645] ? proc_fail_nth_read+0x220/0x220 [ 2862.036853][ T645] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2862.041801][ T645] ? vfs_write+0x9af/0x1050 [ 2862.046140][ T645] ? vmacache_update+0xb7/0x120 [ 2862.050828][ T645] kernel_clone+0x22d/0x990 [ 2862.055167][ T645] ? file_end_write+0x1b0/0x1b0 [ 2862.059853][ T645] ? __kasan_check_write+0x14/0x20 [ 2862.064803][ T645] ? create_io_thread+0x1e0/0x1e0 [ 2862.069660][ T645] ? __mutex_lock_slowpath+0x10/0x10 [ 2862.074783][ T645] __x64_sys_clone+0x289/0x310 [ 2862.079381][ T645] ? __do_sys_vfork+0x130/0x130 [ 2862.084070][ T645] ? debug_smp_processor_id+0x17/0x20 [ 2862.089278][ T645] do_syscall_64+0x44/0xd0 [ 2862.093530][ T645] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2862.099257][ T645] RIP: 0033:0x7f4243ed90d9 [ 2862.103508][ T645] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2862.122953][ T645] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2862.131196][ T645] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2862.139006][ T645] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2862.146817][ T645] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:42:10 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) 07:42:10 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x9501, 0x10, 0x0}, 0x80) [ 2862.154628][ T645] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2862.162438][ T645] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2862.170258][ T645] [ 2862.201142][ T670] FAULT_INJECTION: forcing a failure. [ 2862.201142][ T670] name failslab, interval 1, probability 0, space 0, times 0 [ 2862.213593][ T670] CPU: 1 PID: 670 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2862.223449][ T670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2862.233341][ T670] Call Trace: [ 2862.236462][ T670] [ 2862.239240][ T670] dump_stack_lvl+0x151/0x1b7 [ 2862.243752][ T670] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2862.249051][ T670] dump_stack+0x15/0x17 [ 2862.253040][ T670] should_fail+0x3c0/0x510 [ 2862.257292][ T670] __should_failslab+0x9f/0xe0 [ 2862.261893][ T670] should_failslab+0x9/0x20 [ 2862.266232][ T670] kmem_cache_alloc+0x4f/0x2f0 [ 2862.270833][ T670] ? anon_vma_clone+0xa1/0x4f0 [ 2862.275432][ T670] anon_vma_clone+0xa1/0x4f0 [ 2862.279858][ T670] anon_vma_fork+0x91/0x4f0 [ 2862.284198][ T670] ? anon_vma_name+0x4c/0x70 [ 2862.288624][ T670] dup_mmap+0x750/0xea0 [ 2862.292617][ T670] ? __delayed_free_task+0x20/0x20 [ 2862.297566][ T670] ? mm_init+0x807/0x960 [ 2862.301642][ T670] dup_mm+0x91/0x330 [ 2862.305383][ T670] copy_mm+0x108/0x1b0 [ 2862.309279][ T670] copy_process+0x1295/0x3250 [ 2862.313794][ T670] ? proc_fail_nth_write+0x213/0x290 [ 2862.318913][ T670] ? proc_fail_nth_read+0x220/0x220 [ 2862.323948][ T670] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2862.328894][ T670] ? vfs_write+0x9af/0x1050 [ 2862.333241][ T670] ? vmacache_update+0xb7/0x120 [ 2862.337923][ T670] kernel_clone+0x22d/0x990 [ 2862.342266][ T670] ? file_end_write+0x1b0/0x1b0 [ 2862.346947][ T670] ? __kasan_check_write+0x14/0x20 [ 2862.351897][ T670] ? create_io_thread+0x1e0/0x1e0 [ 2862.356756][ T670] ? __mutex_lock_slowpath+0x10/0x10 [ 2862.361876][ T670] __x64_sys_clone+0x289/0x310 [ 2862.366476][ T670] ? __do_sys_vfork+0x130/0x130 [ 2862.371163][ T670] ? debug_smp_processor_id+0x17/0x20 [ 2862.376370][ T670] do_syscall_64+0x44/0xd0 [ 2862.380624][ T670] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2862.386350][ T670] RIP: 0033:0x7f4243ed90d9 [ 2862.390604][ T670] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2862.410045][ T670] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2862.418289][ T670] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2862.426100][ T670] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2862.433917][ T670] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2862.441722][ T670] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2862.449534][ T670] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2862.457348][ T670] 07:42:10 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 64) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)=r2) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:10 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000610000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x0, 0x6, 0x18, &(0x7f0000000000)="4d09ebedb9ea", &(0x7f0000000040)=""/24, 0x7, 0x0, 0x6c, 0x1000, &(0x7f0000000080)="132ba6858bc5ae74a767e266c9d234970d81ecaa124a9596d2b5e1ad4844e8a8f86f51a579679efec73144b03f8f725b10b67a89e59a5bd2141ddefe5a503fcf4e36db07826e9bdb0c0b91dbf4d0e0f1454485cf9da6a84682a7e6fbd5086cba736d80d5a17068ad05c58662", &(0x7f0000000580)="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", 0x0, 0x2}, 0x48) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) close(r0) 07:42:10 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x9801, 0x10, 0x0}, 0x80) 07:42:10 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) 07:42:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) close(r0) 07:42:10 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x9902, 0x10, 0x0}, 0x80) 07:42:10 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000620000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x0, 0x6, 0x18, &(0x7f0000000000)="4d09ebedb9ea", &(0x7f0000000040)=""/24, 0x7, 0x0, 0x6c, 0x1000, &(0x7f0000000080)="132ba6858bc5ae74a767e266c9d234970d81ecaa124a9596d2b5e1ad4844e8a8f86f51a579679efec73144b03f8f725b10b67a89e59a5bd2141ddefe5a503fcf4e36db07826e9bdb0c0b91dbf4d0e0f1454485cf9da6a84682a7e6fbd5086cba736d80d5a17068ad05c58662", &(0x7f0000000580)="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", 0x0, 0x2}, 0x48) write$cgroup_pressure(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x0, 0x6, 0x18, &(0x7f0000000000)="4d09ebedb9ea", &(0x7f0000000040)=""/24, 0x7, 0x0, 0x6c, 0x1000, &(0x7f0000000080)="132ba6858bc5ae74a767e266c9d234970d81ecaa124a9596d2b5e1ad4844e8a8f86f51a579679efec73144b03f8f725b10b67a89e59a5bd2141ddefe5a503fcf4e36db07826e9bdb0c0b91dbf4d0e0f1454485cf9da6a84682a7e6fbd5086cba736d80d5a17068ad05c58662", &(0x7f0000000580)="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", 0x0, 0x2}, 0x48) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) 07:42:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) close(r0) 07:42:10 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000630000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2862.546608][ T685] FAULT_INJECTION: forcing a failure. [ 2862.546608][ T685] name failslab, interval 1, probability 0, space 0, times 0 [ 2862.565657][ T685] CPU: 1 PID: 685 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2862.575553][ T685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2862.585446][ T685] Call Trace: [ 2862.588574][ T685] [ 2862.591348][ T685] dump_stack_lvl+0x151/0x1b7 [ 2862.595865][ T685] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2862.601152][ T685] ? do_syscall_64+0x44/0xd0 [ 2862.605584][ T685] dump_stack+0x15/0x17 [ 2862.609575][ T685] should_fail+0x3c0/0x510 [ 2862.613827][ T685] __should_failslab+0x9f/0xe0 [ 2862.618425][ T685] should_failslab+0x9/0x20 [ 2862.622764][ T685] kmem_cache_alloc+0x4f/0x2f0 [ 2862.627361][ T685] ? anon_vma_clone+0xa1/0x4f0 [ 2862.631962][ T685] anon_vma_clone+0xa1/0x4f0 [ 2862.636393][ T685] anon_vma_fork+0x91/0x4f0 [ 2862.640725][ T685] ? anon_vma_name+0x43/0x70 [ 2862.645154][ T685] dup_mmap+0x750/0xea0 [ 2862.649149][ T685] ? __delayed_free_task+0x20/0x20 [ 2862.654092][ T685] ? mm_init+0x807/0x960 [ 2862.658172][ T685] dup_mm+0x91/0x330 [ 2862.661905][ T685] copy_mm+0x108/0x1b0 [ 2862.665811][ T685] copy_process+0x1295/0x3250 [ 2862.670325][ T685] ? proc_fail_nth_write+0x213/0x290 [ 2862.675445][ T685] ? proc_fail_nth_read+0x220/0x220 [ 2862.680483][ T685] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2862.685424][ T685] ? vfs_write+0x9af/0x1050 [ 2862.689765][ T685] ? vmacache_update+0xb7/0x120 [ 2862.694453][ T685] kernel_clone+0x22d/0x990 [ 2862.698790][ T685] ? file_end_write+0x1b0/0x1b0 [ 2862.703479][ T685] ? __kasan_check_write+0x14/0x20 [ 2862.708424][ T685] ? create_io_thread+0x1e0/0x1e0 [ 2862.713288][ T685] ? __mutex_lock_slowpath+0x10/0x10 [ 2862.718407][ T685] __x64_sys_clone+0x289/0x310 [ 2862.723006][ T685] ? __do_sys_vfork+0x130/0x130 [ 2862.727696][ T685] ? debug_smp_processor_id+0x17/0x20 [ 2862.732903][ T685] do_syscall_64+0x44/0xd0 [ 2862.737153][ T685] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2862.742883][ T685] RIP: 0033:0x7f4243ed90d9 [ 2862.747135][ T685] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2862.766574][ T685] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2862.774821][ T685] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2862.782631][ T685] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 07:42:11 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = syz_clone(0x918800, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x2, 0x40, 0x81, 0x1f, 0x0, 0x2, 0x20000, 0xb, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f0000000080), 0xa}, 0x20, 0x4, 0x7, 0x0, 0x2, 0x400, 0x8, 0x0, 0x0, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000001c0)={0x3, 0x80, 0x7, 0x2, 0x8, 0x9, 0x0, 0x10000, 0x181, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000140)}, 0x220, 0x0, 0x3, 0xa, 0x6, 0xfffffc01, 0x0, 0x0, 0x9, 0x0, 0x5cb}) 07:42:11 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000680000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x0, 0x6, 0x18, &(0x7f0000000000)="4d09ebedb9ea", &(0x7f0000000040)=""/24, 0x7, 0x0, 0x6c, 0x1000, &(0x7f0000000080)="132ba6858bc5ae74a767e266c9d234970d81ecaa124a9596d2b5e1ad4844e8a8f86f51a579679efec73144b03f8f725b10b67a89e59a5bd2141ddefe5a503fcf4e36db07826e9bdb0c0b91dbf4d0e0f1454485cf9da6a84682a7e6fbd5086cba736d80d5a17068ad05c58662", &(0x7f0000000580)="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", 0x0, 0x2}, 0x48) write$cgroup_pressure(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x0, 0x6, 0x18, &(0x7f0000000000)="4d09ebedb9ea", &(0x7f0000000040)=""/24, 0x7, 0x0, 0x6c, 0x1000, &(0x7f0000000080)="132ba6858bc5ae74a767e266c9d234970d81ecaa124a9596d2b5e1ad4844e8a8f86f51a579679efec73144b03f8f725b10b67a89e59a5bd2141ddefe5a503fcf4e36db07826e9bdb0c0b91dbf4d0e0f1454485cf9da6a84682a7e6fbd5086cba736d80d5a17068ad05c58662", &(0x7f0000000580)="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", 0x0, 0x2}, 0x48) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) 07:42:11 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xb000, 0x10, 0x0}, 0x80) 07:42:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x5) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='$-&.{,#*[(#+|\x00') 07:42:11 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 75) 07:42:11 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xdd00, 0x10, 0x0}, 0x80) 07:42:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r0) (async) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x5) (async, rerun: 64) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) close(r2) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='$-&.{,#*[(#+|\x00') 07:42:11 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r0 = syz_clone(0x918800, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0) (async, rerun: 64) r2 = getpid() perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) (async, rerun: 32) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x2, 0x40, 0x81, 0x1f, 0x0, 0x2, 0x20000, 0xb, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f0000000080), 0xa}, 0x20, 0x4, 0x7, 0x0, 0x2, 0x400, 0x8, 0x0, 0x0, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x9) (async, rerun: 32) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000001c0)={0x3, 0x80, 0x7, 0x2, 0x8, 0x9, 0x0, 0x10000, 0x181, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000140)}, 0x220, 0x0, 0x3, 0xa, 0x6, 0xfffffc01, 0x0, 0x0, 0x9, 0x0, 0x5cb}) 07:42:11 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000690000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2862.790443][ T685] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2862.798345][ T685] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2862.806150][ T685] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2862.813966][ T685] 07:42:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0xb0e, 0x7, 0x0, 0x610, r0, 0xd42b, '\x00', r2, 0xffffffffffffffff, 0x2, 0x2, 0x4, 0x9}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8000}, [@cb_func={0x18, 0x1}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x9}]}, &(0x7f0000000080)='syzkaller\x00', 0x7ff, 0x1000, &(0x7f0000000580)=""/4096, 0x41100, 0x16, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x403, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x3, 0xffffffff, 0x3000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r0]}, 0x80) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000200)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000000)) 07:42:11 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000006a0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:11 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r0 = syz_clone(0x918800, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x2, 0x40, 0x81, 0x1f, 0x0, 0x2, 0x20000, 0xb, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f0000000080), 0xa}, 0x20, 0x4, 0x7, 0x0, 0x2, 0x400, 0x8, 0x0, 0x0, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000001c0)={0x3, 0x80, 0x7, 0x2, 0x8, 0x9, 0x0, 0x10000, 0x181, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000140)}, 0x220, 0x0, 0x3, 0xa, 0x6, 0xfffffc01, 0x0, 0x0, 0x9, 0x0, 0x5cb}) [ 2862.866619][ T722] FAULT_INJECTION: forcing a failure. [ 2862.866619][ T722] name failslab, interval 1, probability 0, space 0, times 0 [ 2862.895466][ T722] CPU: 0 PID: 722 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2862.905363][ T722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2862.915259][ T722] Call Trace: [ 2862.918381][ T722] [ 2862.921160][ T722] dump_stack_lvl+0x151/0x1b7 [ 2862.925671][ T722] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2862.930966][ T722] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2862.937215][ T722] dump_stack+0x15/0x17 [ 2862.941206][ T722] should_fail+0x3c0/0x510 [ 2862.945464][ T722] __should_failslab+0x9f/0xe0 [ 2862.950058][ T722] should_failslab+0x9/0x20 [ 2862.954402][ T722] kmem_cache_alloc+0x4f/0x2f0 [ 2862.958998][ T722] ? anon_vma_fork+0xf7/0x4f0 [ 2862.963514][ T722] anon_vma_fork+0xf7/0x4f0 [ 2862.967859][ T722] ? anon_vma_name+0x43/0x70 [ 2862.972278][ T722] dup_mmap+0x750/0xea0 [ 2862.976271][ T722] ? __delayed_free_task+0x20/0x20 [ 2862.981218][ T722] ? mm_init+0x807/0x960 [ 2862.985295][ T722] dup_mm+0x91/0x330 [ 2862.989028][ T722] copy_mm+0x108/0x1b0 [ 2862.992937][ T722] copy_process+0x1295/0x3250 [ 2862.997448][ T722] ? proc_fail_nth_write+0x213/0x290 [ 2863.002567][ T722] ? proc_fail_nth_read+0x220/0x220 [ 2863.007602][ T722] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2863.012549][ T722] ? vfs_write+0x9af/0x1050 [ 2863.016887][ T722] ? vmacache_update+0xb7/0x120 [ 2863.021582][ T722] kernel_clone+0x22d/0x990 [ 2863.025914][ T722] ? file_end_write+0x1b0/0x1b0 [ 2863.030600][ T722] ? __kasan_check_write+0x14/0x20 [ 2863.035549][ T722] ? create_io_thread+0x1e0/0x1e0 [ 2863.040409][ T722] ? __mutex_lock_slowpath+0x10/0x10 [ 2863.045530][ T722] __x64_sys_clone+0x289/0x310 [ 2863.050131][ T722] ? __do_sys_vfork+0x130/0x130 [ 2863.054816][ T722] ? debug_smp_processor_id+0x17/0x20 [ 2863.060024][ T722] do_syscall_64+0x44/0xd0 [ 2863.064276][ T722] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2863.070004][ T722] RIP: 0033:0x7f4243ed90d9 [ 2863.074259][ T722] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2863.093698][ T722] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2863.101943][ T722] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2863.109753][ T722] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 07:42:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0xb0e, 0x7, 0x0, 0x610, r0, 0xd42b, '\x00', r2, 0xffffffffffffffff, 0x2, 0x2, 0x4, 0x9}, 0x48) (async, rerun: 64) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8000}, [@cb_func={0x18, 0x1}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x9}]}, &(0x7f0000000080)='syzkaller\x00', 0x7ff, 0x1000, &(0x7f0000000580)=""/4096, 0x41100, 0x16, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x403, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x3, 0xffffffff, 0x3000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r0]}, 0x80) (rerun: 64) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r3, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000200)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000000)) 07:42:11 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xf000, 0x10, 0x0}, 0x80) 07:42:11 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000006b0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:11 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) [ 2863.117565][ T722] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2863.125377][ T722] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2863.133187][ T722] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2863.141001][ T722] [ 2863.172543][ T722] ================================================================== [ 2863.180430][ T722] BUG: KASAN: use-after-free in vm_area_free+0x7e/0x230 [ 2863.187198][ T722] Write of size 4 at addr ffff88810ef762a8 by task syz-executor.4/722 [ 2863.195181][ T722] [ 2863.197353][ T722] CPU: 0 PID: 722 Comm: syz-executor.4 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2863.207247][ T722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2863.217141][ T722] Call Trace: [ 2863.220264][ T722] [ 2863.223041][ T722] dump_stack_lvl+0x151/0x1b7 [ 2863.227555][ T722] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2863.232850][ T722] ? panic+0x727/0x727 [ 2863.236758][ T722] ? slab_free_freelist_hook+0xc9/0x1a0 [ 2863.242137][ T722] print_address_description+0x87/0x3d0 [ 2863.247517][ T722] kasan_report+0x1a6/0x1f0 [ 2863.251855][ T722] ? vm_area_free+0x7e/0x230 [ 2863.256283][ T722] ? vm_area_free+0x7e/0x230 [ 2863.260710][ T722] kasan_check_range+0x2aa/0x2e0 [ 2863.265481][ T722] __kasan_check_write+0x14/0x20 [ 2863.270255][ T722] vm_area_free+0x7e/0x230 [ 2863.274508][ T722] dup_mmap+0xbcd/0xea0 [ 2863.278502][ T722] ? __delayed_free_task+0x20/0x20 [ 2863.283449][ T722] ? mm_init+0x807/0x960 [ 2863.287528][ T722] dup_mm+0x91/0x330 [ 2863.291260][ T722] copy_mm+0x108/0x1b0 [ 2863.295165][ T722] copy_process+0x1295/0x3250 [ 2863.299678][ T722] ? proc_fail_nth_write+0x213/0x290 [ 2863.304799][ T722] ? proc_fail_nth_read+0x220/0x220 [ 2863.309833][ T722] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2863.314781][ T722] ? vfs_write+0x9af/0x1050 [ 2863.319117][ T722] ? vmacache_update+0xb7/0x120 [ 2863.323807][ T722] kernel_clone+0x22d/0x990 [ 2863.328147][ T722] ? file_end_write+0x1b0/0x1b0 [ 2863.332833][ T722] ? __kasan_check_write+0x14/0x20 [ 2863.337782][ T722] ? create_io_thread+0x1e0/0x1e0 [ 2863.342639][ T722] ? __mutex_lock_slowpath+0x10/0x10 [ 2863.347762][ T722] __x64_sys_clone+0x289/0x310 [ 2863.352361][ T722] ? __do_sys_vfork+0x130/0x130 [ 2863.357048][ T722] ? debug_smp_processor_id+0x17/0x20 [ 2863.362256][ T722] do_syscall_64+0x44/0xd0 [ 2863.366508][ T722] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2863.372234][ T722] RIP: 0033:0x7f4243ed90d9 [ 2863.376490][ T722] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2863.395929][ T722] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2863.404174][ T722] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2863.411985][ T722] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2863.419798][ T722] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2863.427609][ T722] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2863.435423][ T722] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2863.443241][ T722] [ 2863.446095][ T722] [ 2863.448266][ T722] Allocated by task 685: [ 2863.452346][ T722] __kasan_slab_alloc+0xb2/0xe0 [ 2863.457031][ T722] kmem_cache_alloc+0x189/0x2f0 [ 2863.461716][ T722] vm_area_dup+0x26/0x1d0 [ 2863.465883][ T722] dup_mmap+0x6b8/0xea0 [ 2863.469877][ T722] dup_mm+0x91/0x330 [ 2863.473606][ T722] copy_mm+0x108/0x1b0 [ 2863.477514][ T722] copy_process+0x1295/0x3250 [ 2863.482024][ T722] kernel_clone+0x22d/0x990 [ 2863.486365][ T722] __x64_sys_clone+0x289/0x310 [ 2863.490965][ T722] do_syscall_64+0x44/0xd0 [ 2863.495217][ T722] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2863.500946][ T722] [ 2863.503115][ T722] Freed by task 704: [ 2863.506849][ T722] kasan_set_track+0x4c/0x70 [ 2863.511274][ T722] kasan_set_free_info+0x23/0x40 [ 2863.516049][ T722] ____kasan_slab_free+0x126/0x160 [ 2863.520997][ T722] __kasan_slab_free+0x11/0x20 [ 2863.525595][ T722] slab_free_freelist_hook+0xc9/0x1a0 [ 2863.530802][ T722] kmem_cache_free+0x11a/0x2e0 [ 2863.535402][ T722] vm_area_free+0x1ae/0x230 [ 2863.539743][ T722] exit_mmap+0x5dd/0x7a0 [ 2863.543821][ T722] __mmput+0x95/0x300 [ 2863.547641][ T722] mmput+0x50/0x60 [ 2863.551198][ T722] exit_mm+0x50d/0x760 [ 2863.555104][ T722] do_exit+0x63c/0x24d0 [ 2863.559098][ T722] __ia32_sys_exit+0x0/0x40 [ 2863.563435][ T722] do_syscall_64+0x44/0xd0 [ 2863.567691][ T722] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2863.573417][ T722] [ 2863.575586][ T722] The buggy address belongs to the object at ffff88810ef76250 [ 2863.575586][ T722] which belongs to the cache vm_area_struct of size 232 [ 2863.589735][ T722] The buggy address is located 88 bytes inside of [ 2863.589735][ T722] 232-byte region [ffff88810ef76250, ffff88810ef76338) [ 2863.602754][ T722] The buggy address belongs to the page: [ 2863.608223][ T722] page:ffffea00043bdd80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ef76 [ 2863.618289][ T722] flags: 0x4000000000000200(slab|zone=1) [ 2863.623777][ T722] raw: 4000000000000200 ffffea0005a42580 0000000600000006 ffff888100274a80 [ 2863.632180][ T722] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000 [ 2863.640592][ T722] page dumped because: kasan: bad access detected [ 2863.646843][ T722] page_owner tracks the page as allocated [ 2863.652397][ T722] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 13308, ts 2625834686734, free_ts 2625827571364 [ 2863.668627][ T722] post_alloc_hook+0x1ab/0x1b0 [ 2863.673226][ T722] get_page_from_freelist+0x38b/0x400 [ 2863.678433][ T722] __alloc_pages+0x3a8/0x7c0 [ 2863.682860][ T722] allocate_slab+0x62/0x580 [ 2863.687199][ T722] ___slab_alloc+0x2e2/0x6f0 [ 2863.691626][ T722] __slab_alloc+0x4a/0x90 [ 2863.695794][ T722] kmem_cache_alloc+0x205/0x2f0 [ 2863.700478][ T722] vm_area_dup+0x26/0x1d0 [ 2863.704645][ T722] dup_mmap+0x6b8/0xea0 [ 2863.708639][ T722] dup_mm+0x91/0x330 [ 2863.712369][ T722] copy_mm+0x108/0x1b0 [ 2863.716274][ T722] copy_process+0x1295/0x3250 [ 2863.720790][ T722] kernel_clone+0x22d/0x990 [ 2863.725136][ T722] __x64_sys_clone+0x289/0x310 [ 2863.729730][ T722] do_syscall_64+0x44/0xd0 [ 2863.733981][ T722] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2863.739709][ T722] page last free stack trace: [ 2863.744221][ T722] free_pcp_prepare+0x448/0x450 [ 2863.748911][ T722] free_unref_page_list+0x16a/0xad0 [ 2863.753942][ T722] release_pages+0xf3e/0xf90 [ 2863.758368][ T722] free_pages_and_swap_cache+0x97/0xb0 [ 2863.763664][ T722] tlb_flush_mmu+0x860/0xa00 [ 2863.768089][ T722] tlb_finish_mmu+0xd2/0x1f0 [ 2863.772517][ T722] exit_mmap+0x46e/0x7a0 [ 2863.776598][ T722] __mmput+0x95/0x300 [ 2863.780414][ T722] mmput+0x50/0x60 [ 2863.783973][ T722] exit_mm+0x50d/0x760 [ 2863.787889][ T722] do_exit+0x63c/0x24d0 [ 2863.791875][ T722] do_group_exit+0x13a/0x300 [ 2863.796295][ T722] get_signal+0x77e/0x1600 [ 2863.800549][ T722] arch_do_signal_or_restart+0x9f/0x670 [ 2863.805929][ T722] exit_to_user_mode_loop+0xd4/0x110 [ 2863.811050][ T722] syscall_exit_to_user_mode+0x79/0xc0 [ 2863.816346][ T722] [ 2863.818516][ T722] Memory state around the buggy address: [ 2863.823986][ T722] ffff88810ef76180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2863.831887][ T722] ffff88810ef76200: fb fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb [ 2863.839782][ T722] >ffff88810ef76280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2863.847681][ T722] ^ [ 2863.852896][ T722] ffff88810ef76300: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fa [ 2863.860791][ T722] ffff88810ef76380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 07:42:12 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 76) 07:42:12 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000006c0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0xb0e, 0x7, 0x0, 0x610, r0, 0xd42b, '\x00', r2, 0xffffffffffffffff, 0x2, 0x2, 0x4, 0x9}, 0x48) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8000}, [@cb_func={0x18, 0x1}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x9}]}, &(0x7f0000000080)='syzkaller\x00', 0x7ff, 0x1000, &(0x7f0000000580)=""/4096, 0x41100, 0x16, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x403, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x3, 0xffffffff, 0x3000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r0]}, 0x80) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r3, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000200)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000000)) 07:42:12 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x5) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='$-&.{,#*[(#+|\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x5) (async) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(r2) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='$-&.{,#*[(#+|\x00') (async) 07:42:12 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xfb03, 0x10, 0x0}, 0x80) 07:42:12 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xff00, 0x10, 0x0}, 0x80) 07:42:12 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000710000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:12 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:12 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040), 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) r4 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r4) 07:42:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x4000, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'bridge0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r3 = getpid() perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000000)=""/229) [ 2863.868696][ T722] ================================================================== [ 2863.876667][ T722] Disabling lock debugging due to kernel taint 07:42:12 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x1ac5c8, 0x10, 0x0}, 0x80) 07:42:12 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000720000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2863.935807][ T777] FAULT_INJECTION: forcing a failure. [ 2863.935807][ T777] name failslab, interval 1, probability 0, space 0, times 0 [ 2863.973010][ T777] CPU: 1 PID: 777 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2863.984313][ T777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2863.994204][ T777] Call Trace: [ 2863.997326][ T777] [ 2864.000105][ T777] dump_stack_lvl+0x151/0x1b7 [ 2864.004617][ T777] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2864.009915][ T777] dump_stack+0x15/0x17 [ 2864.013903][ T777] should_fail+0x3c0/0x510 [ 2864.018158][ T777] __should_failslab+0x9f/0xe0 [ 2864.022756][ T777] should_failslab+0x9/0x20 [ 2864.027098][ T777] kmem_cache_alloc+0x4f/0x2f0 [ 2864.031695][ T777] ? anon_vma_fork+0x1b9/0x4f0 [ 2864.036298][ T777] anon_vma_fork+0x1b9/0x4f0 [ 2864.040722][ T777] dup_mmap+0x750/0xea0 [ 2864.044715][ T777] ? __delayed_free_task+0x20/0x20 [ 2864.049662][ T777] ? mm_init+0x807/0x960 [ 2864.053739][ T777] dup_mm+0x91/0x330 [ 2864.057473][ T777] copy_mm+0x108/0x1b0 [ 2864.061380][ T777] copy_process+0x1295/0x3250 [ 2864.065892][ T777] ? proc_fail_nth_write+0x213/0x290 [ 2864.071015][ T777] ? proc_fail_nth_read+0x220/0x220 [ 2864.076045][ T777] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2864.080992][ T777] ? vfs_write+0x9af/0x1050 [ 2864.085332][ T777] ? vmacache_update+0xb7/0x120 [ 2864.090018][ T777] kernel_clone+0x22d/0x990 [ 2864.094358][ T777] ? file_end_write+0x1b0/0x1b0 [ 2864.099045][ T777] ? __kasan_check_write+0x14/0x20 [ 2864.103994][ T777] ? create_io_thread+0x1e0/0x1e0 [ 2864.108852][ T777] ? __mutex_lock_slowpath+0x10/0x10 [ 2864.113973][ T777] __x64_sys_clone+0x289/0x310 [ 2864.118573][ T777] ? __do_sys_vfork+0x130/0x130 [ 2864.123261][ T777] ? debug_smp_processor_id+0x17/0x20 [ 2864.128468][ T777] do_syscall_64+0x44/0xd0 [ 2864.132721][ T777] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2864.138449][ T777] RIP: 0033:0x7f4243ed90d9 [ 2864.142702][ T777] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2864.162143][ T777] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2864.170387][ T777] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2864.178204][ T777] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 07:42:12 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 77) 07:42:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x4000, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'bridge0\x00'}) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) (async) r3 = getpid() perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) (async) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000000)=""/229) 07:42:12 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x200000, 0x10, 0x0}, 0x80) 07:42:12 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040), 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) (async) r4 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r4) 07:42:12 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) 07:42:12 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000730000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:12 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000740000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x4000, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'bridge0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) (async) r3 = getpid() perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) (async, rerun: 64) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000000)=""/229) 07:42:12 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x1000000, 0x10, 0x0}, 0x80) [ 2864.186009][ T777] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2864.193823][ T777] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2864.201632][ T777] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2864.209446][ T777] 07:42:12 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 64) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040), 0x10) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r3, 0xffffffffffffffff, r3, r3, r3, r3, r3, 0xffffffffffffffff]}, 0x80) (rerun: 64) r4 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r4) 07:42:12 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000790000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x404002, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) [ 2864.245926][ T806] FAULT_INJECTION: forcing a failure. [ 2864.245926][ T806] name failslab, interval 1, probability 0, space 0, times 0 [ 2864.277139][ T806] CPU: 1 PID: 806 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2864.288426][ T806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2864.298318][ T806] Call Trace: [ 2864.301443][ T806] [ 2864.304220][ T806] dump_stack_lvl+0x151/0x1b7 [ 2864.308736][ T806] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2864.314030][ T806] dump_stack+0x15/0x17 [ 2864.318023][ T806] should_fail+0x3c0/0x510 [ 2864.322272][ T806] __should_failslab+0x9f/0xe0 [ 2864.326869][ T806] should_failslab+0x9/0x20 [ 2864.331210][ T806] kmem_cache_alloc+0x4f/0x2f0 [ 2864.335807][ T806] ? anon_vma_fork+0x1b9/0x4f0 [ 2864.340410][ T806] anon_vma_fork+0x1b9/0x4f0 [ 2864.344837][ T806] dup_mmap+0x750/0xea0 [ 2864.348829][ T806] ? __delayed_free_task+0x20/0x20 [ 2864.353774][ T806] ? mm_init+0x807/0x960 [ 2864.357853][ T806] dup_mm+0x91/0x330 [ 2864.361588][ T806] copy_mm+0x108/0x1b0 [ 2864.365490][ T806] copy_process+0x1295/0x3250 [ 2864.370004][ T806] ? proc_fail_nth_write+0x213/0x290 [ 2864.375125][ T806] ? proc_fail_nth_read+0x220/0x220 [ 2864.380158][ T806] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2864.385104][ T806] ? vfs_write+0x9af/0x1050 [ 2864.389443][ T806] ? vmacache_update+0xb7/0x120 [ 2864.394135][ T806] kernel_clone+0x22d/0x990 [ 2864.398474][ T806] ? file_end_write+0x1b0/0x1b0 [ 2864.403160][ T806] ? __kasan_check_write+0x14/0x20 [ 2864.408106][ T806] ? create_io_thread+0x1e0/0x1e0 [ 2864.412966][ T806] ? __mutex_lock_slowpath+0x10/0x10 [ 2864.418087][ T806] __x64_sys_clone+0x289/0x310 [ 2864.422688][ T806] ? __do_sys_vfork+0x130/0x130 [ 2864.427377][ T806] ? debug_smp_processor_id+0x17/0x20 [ 2864.432582][ T806] do_syscall_64+0x44/0xd0 [ 2864.436846][ T806] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2864.442561][ T806] RIP: 0033:0x7f4243ed90d9 [ 2864.446815][ T806] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2864.466255][ T806] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2864.474500][ T806] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2864.482310][ T806] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 07:42:12 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 78) 07:42:12 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=0xffffffffffffffff, 0x12) syz_clone(0x31028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:12 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x1010000, 0x10, 0x0}, 0x80) 07:42:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x404002, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:12 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000007a0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:12 executing program 5: perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x8c, 0x6, 0xfc, 0xff, 0x0, 0x2, 0x82, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000280), 0x2}, 0x18100, 0x3, 0xbc4, 0x9, 0x5, 0x9, 0xfa31, 0x0, 0x200, 0x0, 0x7000000000}, 0x0, 0x10, 0xffffffffffffffff, 0xb) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000380)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) close(r0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={&(0x7f0000000000)="a943168a08eb6d6da32f88045e9e398df55551a0a84a3b242c3791559d3769b054c2603a6d07dacd3a60df8c0ad5d9bc076c30eae832068c03373baa83dc16b6f27ecb1cae238167b36867bde22d814a71a033255d1ff5845875aa3b1f8aa1cd175aecc08a1e1520304c04d8ed1df28fddaf58315e243a26ab6819aa0f11cd5f871d0ecb33295cce73b0d9d15141ad16df94eed36eaa8d4a4a3d704e7c67e4f2bd6755595f2f24a067a857bb542f53eb665e0ee27616b4cc46aa152ad977", &(0x7f00000000c0)=""/232, &(0x7f00000001c0)="e3c4f5e5e06e490ecd4290ab32d27dfa629c8eae8a9f4143eabc5b36d74cad3a32", &(0x7f0000000200)="6b66a942f813838885d2a229307e67", 0x1f, 0xffffffffffffffff, 0x4}, 0x38) 07:42:12 executing program 5: perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x8c, 0x6, 0xfc, 0xff, 0x0, 0x2, 0x82, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000280), 0x2}, 0x18100, 0x3, 0xbc4, 0x9, 0x5, 0x9, 0xfa31, 0x0, 0x200, 0x0, 0x7000000000}, 0x0, 0x10, 0xffffffffffffffff, 0xb) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r2) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000380)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) (async) close(r0) (async, rerun: 32) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={&(0x7f0000000000)="a943168a08eb6d6da32f88045e9e398df55551a0a84a3b242c3791559d3769b054c2603a6d07dacd3a60df8c0ad5d9bc076c30eae832068c03373baa83dc16b6f27ecb1cae238167b36867bde22d814a71a033255d1ff5845875aa3b1f8aa1cd175aecc08a1e1520304c04d8ed1df28fddaf58315e243a26ab6819aa0f11cd5f871d0ecb33295cce73b0d9d15141ad16df94eed36eaa8d4a4a3d704e7c67e4f2bd6755595f2f24a067a857bb542f53eb665e0ee27616b4cc46aa152ad977", &(0x7f00000000c0)=""/232, &(0x7f00000001c0)="e3c4f5e5e06e490ecd4290ab32d27dfa629c8eae8a9f4143eabc5b36d74cad3a32", &(0x7f0000000200)="6b66a942f813838885d2a229307e67", 0x1f, 0xffffffffffffffff, 0x4}, 0x38) (rerun: 32) [ 2864.490124][ T806] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2864.497937][ T806] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2864.505749][ T806] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2864.513560][ T806] 07:42:12 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x2000000, 0x10, 0x0}, 0x80) 07:42:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x404002, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x404002, 0x0) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) 07:42:12 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000007b0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:12 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000b00000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:12 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x3000000, 0x10, 0x0}, 0x80) [ 2864.544941][ T833] FAULT_INJECTION: forcing a failure. [ 2864.544941][ T833] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2864.579387][ T833] CPU: 0 PID: 833 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2864.590673][ T833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2864.600568][ T833] Call Trace: [ 2864.603690][ T833] [ 2864.606471][ T833] dump_stack_lvl+0x151/0x1b7 [ 2864.610982][ T833] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2864.616280][ T833] dump_stack+0x15/0x17 [ 2864.620264][ T833] should_fail+0x3c0/0x510 [ 2864.624528][ T833] should_fail_alloc_page+0x58/0x70 [ 2864.629549][ T833] __alloc_pages+0x1de/0x7c0 [ 2864.633977][ T833] ? __count_vm_events+0x30/0x30 [ 2864.638752][ T833] pte_alloc_one+0x73/0x1b0 [ 2864.643093][ T833] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2864.648124][ T833] __pte_alloc+0x86/0x350 [ 2864.652289][ T833] ? is_module_text_address+0xe1/0x140 [ 2864.657583][ T833] ? free_pgtables+0x210/0x210 [ 2864.662183][ T833] ? __kernel_text_address+0x9a/0x110 [ 2864.667392][ T833] ? unwind_get_return_address+0x4c/0x90 [ 2864.672858][ T833] copy_pte_range+0x1b1f/0x20b0 [ 2864.677545][ T833] ? stack_trace_save+0x12d/0x1f0 [ 2864.682410][ T833] ? anon_vma_clone+0xa1/0x4f0 [ 2864.687007][ T833] ? __kunmap_atomic+0x80/0x80 [ 2864.691606][ T833] ? dup_mmap+0x750/0xea0 [ 2864.695773][ T833] ? dup_mm+0x91/0x330 [ 2864.699682][ T833] ? copy_mm+0x108/0x1b0 [ 2864.703758][ T833] ? copy_process+0x1295/0x3250 [ 2864.708442][ T833] ? kernel_clone+0x22d/0x990 [ 2864.712955][ T833] ? __x64_sys_clone+0x289/0x310 [ 2864.717729][ T833] ? do_syscall_64+0x44/0xd0 [ 2864.722157][ T833] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2864.728061][ T833] copy_page_range+0xc1e/0x1090 [ 2864.732746][ T833] ? pfn_valid+0x1e0/0x1e0 [ 2864.736998][ T833] dup_mmap+0x99f/0xea0 [ 2864.740991][ T833] ? __delayed_free_task+0x20/0x20 [ 2864.745936][ T833] ? mm_init+0x807/0x960 [ 2864.750017][ T833] dup_mm+0x91/0x330 [ 2864.753748][ T833] copy_mm+0x108/0x1b0 [ 2864.757653][ T833] copy_process+0x1295/0x3250 [ 2864.762168][ T833] ? proc_fail_nth_write+0x213/0x290 [ 2864.767288][ T833] ? proc_fail_nth_read+0x220/0x220 [ 2864.772326][ T833] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2864.777269][ T833] ? vfs_write+0x9af/0x1050 [ 2864.781608][ T833] ? vmacache_update+0xb7/0x120 [ 2864.786295][ T833] kernel_clone+0x22d/0x990 [ 2864.790635][ T833] ? file_end_write+0x1b0/0x1b0 [ 2864.795321][ T833] ? __kasan_check_write+0x14/0x20 [ 2864.800268][ T833] ? create_io_thread+0x1e0/0x1e0 [ 2864.805129][ T833] ? __mutex_lock_slowpath+0x10/0x10 [ 2864.810250][ T833] __x64_sys_clone+0x289/0x310 [ 2864.814850][ T833] ? __do_sys_vfork+0x130/0x130 [ 2864.819536][ T833] ? debug_smp_processor_id+0x17/0x20 [ 2864.824743][ T833] do_syscall_64+0x44/0xd0 [ 2864.828996][ T833] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2864.834728][ T833] RIP: 0033:0x7f4243ed90d9 [ 2864.838978][ T833] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2864.858418][ T833] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2864.866664][ T833] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2864.874479][ T833] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2864.882287][ T833] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:42:13 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 79) 07:42:13 executing program 5: perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x8c, 0x6, 0xfc, 0xff, 0x0, 0x2, 0x82, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000280), 0x2}, 0x18100, 0x3, 0xbc4, 0x9, 0x5, 0x9, 0xfa31, 0x0, 0x200, 0x0, 0x7000000000}, 0x0, 0x10, 0xffffffffffffffff, 0xb) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) close(r2) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000380)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) close(r0) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={&(0x7f0000000000)="a943168a08eb6d6da32f88045e9e398df55551a0a84a3b242c3791559d3769b054c2603a6d07dacd3a60df8c0ad5d9bc076c30eae832068c03373baa83dc16b6f27ecb1cae238167b36867bde22d814a71a033255d1ff5845875aa3b1f8aa1cd175aecc08a1e1520304c04d8ed1df28fddaf58315e243a26ab6819aa0f11cd5f871d0ecb33295cce73b0d9d15141ad16df94eed36eaa8d4a4a3d704e7c67e4f2bd6755595f2f24a067a857bb542f53eb665e0ee27616b4cc46aa152ad977", &(0x7f00000000c0)=""/232, &(0x7f00000001c0)="e3c4f5e5e06e490ecd4290ab32d27dfa629c8eae8a9f4143eabc5b36d74cad3a32", &(0x7f0000000200)="6b66a942f813838885d2a229307e67", 0x1f, 0xffffffffffffffff, 0x4}, 0x38) 07:42:13 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=0xffffffffffffffff, 0x12) (async) syz_clone(0x31028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:13 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000dd0000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4000000, 0x10, 0x0}, 0x80) 07:42:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x5000000, 0x10, 0x0}, 0x80) 07:42:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair(0x26, 0xa, 0x6, &(0x7f0000000000)) close(r0) [ 2864.890098][ T833] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2864.897909][ T833] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2864.905721][ T833] [ 2864.929764][ T854] FAULT_INJECTION: forcing a failure. [ 2864.929764][ T854] name failslab, interval 1, probability 0, space 0, times 0 07:42:13 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000f00000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:13 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=0xffffffffffffffff, 0x12) syz_clone(0x31028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x5010000, 0x10, 0x0}, 0x80) [ 2864.952875][ T854] CPU: 0 PID: 854 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2864.964155][ T854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2864.974051][ T854] Call Trace: [ 2864.977174][ T854] [ 2864.979953][ T854] dump_stack_lvl+0x151/0x1b7 [ 2864.984466][ T854] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2864.989757][ T854] ? do_syscall_64+0x44/0xd0 [ 2864.994187][ T854] dump_stack+0x15/0x17 [ 2864.998177][ T854] should_fail+0x3c0/0x510 [ 2865.002431][ T854] __should_failslab+0x9f/0xe0 [ 2865.007030][ T854] should_failslab+0x9/0x20 [ 2865.011368][ T854] kmem_cache_alloc+0x4f/0x2f0 [ 2865.015969][ T854] ? anon_vma_clone+0xa1/0x4f0 [ 2865.020569][ T854] anon_vma_clone+0xa1/0x4f0 [ 2865.024996][ T854] anon_vma_fork+0x91/0x4f0 [ 2865.029332][ T854] ? anon_vma_name+0x43/0x70 [ 2865.033762][ T854] dup_mmap+0x750/0xea0 [ 2865.037757][ T854] ? __delayed_free_task+0x20/0x20 [ 2865.042697][ T854] ? mm_init+0x807/0x960 [ 2865.046776][ T854] dup_mm+0x91/0x330 [ 2865.050508][ T854] copy_mm+0x108/0x1b0 [ 2865.054414][ T854] copy_process+0x1295/0x3250 [ 2865.058927][ T854] ? proc_fail_nth_write+0x213/0x290 [ 2865.064049][ T854] ? proc_fail_nth_read+0x220/0x220 [ 2865.069088][ T854] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2865.074028][ T854] ? vfs_write+0x9af/0x1050 [ 2865.078377][ T854] ? vmacache_update+0xb7/0x120 [ 2865.083055][ T854] kernel_clone+0x22d/0x990 [ 2865.087397][ T854] ? file_end_write+0x1b0/0x1b0 [ 2865.092082][ T854] ? __kasan_check_write+0x14/0x20 [ 2865.097028][ T854] ? create_io_thread+0x1e0/0x1e0 [ 2865.101888][ T854] ? __mutex_lock_slowpath+0x10/0x10 [ 2865.107008][ T854] __x64_sys_clone+0x289/0x310 [ 2865.111609][ T854] ? __do_sys_vfork+0x130/0x130 [ 2865.116298][ T854] ? debug_smp_processor_id+0x17/0x20 [ 2865.121503][ T854] do_syscall_64+0x44/0xd0 [ 2865.125755][ T854] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2865.131484][ T854] RIP: 0033:0x7f4243ed90d9 [ 2865.135747][ T854] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2865.155179][ T854] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2865.163426][ T854] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2865.171234][ T854] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2865.179044][ T854] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2865.186858][ T854] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2865.194668][ T854] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 07:42:13 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) 07:42:13 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000050100000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:13 executing program 3: r0 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80808}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000000), 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x6000000, 0x10, 0x0}, 0x80) 07:42:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair(0x26, 0xa, 0x6, &(0x7f0000000000)) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) socketpair(0x26, 0xa, 0x6, &(0x7f0000000000)) (async) close(r0) (async) 07:42:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x7000000, 0x10, 0x0}, 0x80) 07:42:13 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000950100000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair(0x26, 0xa, 0x6, &(0x7f0000000000)) (async) close(r0) 07:42:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000100)={&(0x7f0000000040)=""/34, 0x22, 0x0, &(0x7f0000000080)=""/118, 0x76}}, 0x10) [ 2865.202482][ T854] 07:42:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) close(r1) close(r0) 07:42:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0}, 0x80) [ 2865.253894][ T902] FAULT_INJECTION: forcing a failure. [ 2865.253894][ T902] name failslab, interval 1, probability 0, space 0, times 0 [ 2865.274102][ T902] CPU: 0 PID: 902 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2865.285379][ T902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2865.295270][ T902] Call Trace: [ 2865.298394][ T902] [ 2865.301169][ T902] dump_stack_lvl+0x151/0x1b7 [ 2865.305689][ T902] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2865.310980][ T902] dump_stack+0x15/0x17 [ 2865.314970][ T902] should_fail+0x3c0/0x510 [ 2865.319224][ T902] __should_failslab+0x9f/0xe0 [ 2865.323823][ T902] should_failslab+0x9/0x20 [ 2865.328161][ T902] kmem_cache_alloc+0x4f/0x2f0 [ 2865.332763][ T902] ? anon_vma_clone+0xa1/0x4f0 [ 2865.337362][ T902] anon_vma_clone+0xa1/0x4f0 [ 2865.341794][ T902] anon_vma_fork+0x91/0x4f0 [ 2865.346128][ T902] ? anon_vma_name+0x4c/0x70 [ 2865.350554][ T902] dup_mmap+0x750/0xea0 [ 2865.354550][ T902] ? __delayed_free_task+0x20/0x20 [ 2865.359496][ T902] ? mm_init+0x807/0x960 [ 2865.363573][ T902] dup_mm+0x91/0x330 [ 2865.367305][ T902] copy_mm+0x108/0x1b0 [ 2865.371212][ T902] copy_process+0x1295/0x3250 [ 2865.375724][ T902] ? proc_fail_nth_write+0x213/0x290 [ 2865.380845][ T902] ? proc_fail_nth_read+0x220/0x220 [ 2865.385881][ T902] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2865.390825][ T902] ? vfs_write+0x9af/0x1050 [ 2865.395165][ T902] ? vmacache_update+0xb7/0x120 [ 2865.399872][ T902] kernel_clone+0x22d/0x990 [ 2865.404193][ T902] ? file_end_write+0x1b0/0x1b0 [ 2865.408884][ T902] ? __kasan_check_write+0x14/0x20 [ 2865.413826][ T902] ? create_io_thread+0x1e0/0x1e0 [ 2865.418690][ T902] ? __mutex_lock_slowpath+0x10/0x10 [ 2865.423808][ T902] __x64_sys_clone+0x289/0x310 [ 2865.428407][ T902] ? __do_sys_vfork+0x130/0x130 [ 2865.433093][ T902] ? debug_smp_processor_id+0x17/0x20 [ 2865.438301][ T902] do_syscall_64+0x44/0xd0 [ 2865.442554][ T902] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2865.448282][ T902] RIP: 0033:0x7f4243ed90d9 [ 2865.452535][ T902] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2865.471976][ T902] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2865.480220][ T902] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2865.488031][ T902] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2865.495842][ T902] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:42:13 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) 07:42:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x9000000, 0x10, 0x0}, 0x80) 07:42:13 executing program 3: r0 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80808}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) (async) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) (async) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000000), 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:13 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000980100000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) (async, rerun: 32) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (rerun: 32) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000100)={&(0x7f0000000040)=""/34, 0x22, 0x0, &(0x7f0000000080)=""/118, 0x76}}, 0x10) 07:42:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) (rerun: 64) close(r1) (async) close(r0) 07:42:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000100)={&(0x7f0000000040)=""/34, 0x22, 0x0, &(0x7f0000000080)=""/118, 0x76}}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000100)={&(0x7f0000000040)=""/34, 0x22, 0x0, &(0x7f0000000080)=""/118, 0x76}}, 0x10) (async) 07:42:13 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000300000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x9020000, 0x10, 0x0}, 0x80) 07:42:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000000)=0x1) write$cgroup_pressure(r0, 0x0, 0x0) [ 2865.503656][ T902] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2865.511466][ T902] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2865.519278][ T902] 07:42:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000000)=0x1) (async) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xa000000, 0x10, 0x0}, 0x80) [ 2865.559740][ T933] FAULT_INJECTION: forcing a failure. [ 2865.559740][ T933] name failslab, interval 1, probability 0, space 0, times 0 [ 2865.584469][ T933] CPU: 1 PID: 933 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2865.595746][ T933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2865.605647][ T933] Call Trace: [ 2865.608762][ T933] [ 2865.611539][ T933] dump_stack_lvl+0x151/0x1b7 [ 2865.616051][ T933] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2865.621345][ T933] dump_stack+0x15/0x17 [ 2865.625336][ T933] should_fail+0x3c0/0x510 [ 2865.629591][ T933] __should_failslab+0x9f/0xe0 [ 2865.634189][ T933] should_failslab+0x9/0x20 [ 2865.638529][ T933] kmem_cache_alloc+0x4f/0x2f0 [ 2865.643130][ T933] ? anon_vma_clone+0xa1/0x4f0 [ 2865.647730][ T933] anon_vma_clone+0xa1/0x4f0 [ 2865.652156][ T933] anon_vma_fork+0x91/0x4f0 [ 2865.656499][ T933] ? anon_vma_name+0x4c/0x70 [ 2865.660927][ T933] dup_mmap+0x750/0xea0 [ 2865.664916][ T933] ? __delayed_free_task+0x20/0x20 [ 2865.669861][ T933] ? mm_init+0x807/0x960 [ 2865.673942][ T933] dup_mm+0x91/0x330 [ 2865.677680][ T933] copy_mm+0x108/0x1b0 [ 2865.681580][ T933] copy_process+0x1295/0x3250 [ 2865.686092][ T933] ? proc_fail_nth_write+0x213/0x290 [ 2865.691212][ T933] ? proc_fail_nth_read+0x220/0x220 [ 2865.696246][ T933] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2865.701195][ T933] ? vfs_write+0x9af/0x1050 [ 2865.705541][ T933] ? vmacache_update+0xb7/0x120 [ 2865.710221][ T933] kernel_clone+0x22d/0x990 [ 2865.714563][ T933] ? file_end_write+0x1b0/0x1b0 [ 2865.719246][ T933] ? __kasan_check_write+0x14/0x20 [ 2865.724194][ T933] ? create_io_thread+0x1e0/0x1e0 [ 2865.729054][ T933] ? __mutex_lock_slowpath+0x10/0x10 [ 2865.734174][ T933] __x64_sys_clone+0x289/0x310 [ 2865.738776][ T933] ? __do_sys_vfork+0x130/0x130 [ 2865.743463][ T933] ? debug_smp_processor_id+0x17/0x20 [ 2865.748673][ T933] do_syscall_64+0x44/0xd0 [ 2865.752921][ T933] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2865.758654][ T933] RIP: 0033:0x7f4243ed90d9 [ 2865.762909][ T933] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2865.782344][ T933] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2865.790587][ T933] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2865.798398][ T933] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 07:42:14 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 82) 07:42:14 executing program 3: r0 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80808}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) (async) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000000), 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:42:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) close(r1) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) (async) close(r1) (async) close(r0) (async) 07:42:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xb000000, 0x10, 0x0}, 0x80) 07:42:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000000)=0x1) (async) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:14 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000fb0300000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xc000000, 0x10, 0x0}, 0x80) [ 2865.806208][ T933] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2865.814020][ T933] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2865.821921][ T933] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2865.829733][ T933] [ 2865.849892][ T947] FAULT_INJECTION: forcing a failure. 07:42:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xd000000, 0x10, 0x0}, 0x80) 07:42:14 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000500000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8201, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:14 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 07:42:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) [ 2865.849892][ T947] name failslab, interval 1, probability 0, space 0, times 0 [ 2865.874540][ T947] CPU: 1 PID: 947 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2865.885819][ T947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2865.895718][ T947] Call Trace: [ 2865.898840][ T947] [ 2865.901616][ T947] dump_stack_lvl+0x151/0x1b7 [ 2865.906130][ T947] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2865.911424][ T947] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2865.917671][ T947] dump_stack+0x15/0x17 [ 2865.921663][ T947] should_fail+0x3c0/0x510 [ 2865.925918][ T947] __should_failslab+0x9f/0xe0 [ 2865.930517][ T947] should_failslab+0x9/0x20 [ 2865.934856][ T947] kmem_cache_alloc+0x4f/0x2f0 [ 2865.939457][ T947] ? anon_vma_fork+0xf7/0x4f0 [ 2865.943969][ T947] anon_vma_fork+0xf7/0x4f0 [ 2865.948309][ T947] ? anon_vma_name+0x43/0x70 [ 2865.952736][ T947] dup_mmap+0x750/0xea0 [ 2865.956727][ T947] ? __delayed_free_task+0x20/0x20 [ 2865.961672][ T947] ? mm_init+0x807/0x960 [ 2865.965755][ T947] dup_mm+0x91/0x330 [ 2865.969481][ T947] copy_mm+0x108/0x1b0 [ 2865.973386][ T947] copy_process+0x1295/0x3250 [ 2865.977904][ T947] ? proc_fail_nth_write+0x213/0x290 [ 2865.983020][ T947] ? proc_fail_nth_read+0x220/0x220 [ 2865.988060][ T947] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2865.993001][ T947] ? vfs_write+0x9af/0x1050 [ 2865.997339][ T947] ? vmacache_update+0xb7/0x120 [ 2866.002030][ T947] kernel_clone+0x22d/0x990 [ 2866.006369][ T947] ? file_end_write+0x1b0/0x1b0 [ 2866.011055][ T947] ? __kasan_check_write+0x14/0x20 [ 2866.016001][ T947] ? create_io_thread+0x1e0/0x1e0 [ 2866.020865][ T947] ? __mutex_lock_slowpath+0x10/0x10 [ 2866.025982][ T947] __x64_sys_clone+0x289/0x310 [ 2866.030584][ T947] ? __do_sys_vfork+0x130/0x130 [ 2866.035269][ T947] ? debug_smp_processor_id+0x17/0x20 [ 2866.040476][ T947] do_syscall_64+0x44/0xd0 [ 2866.044730][ T947] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2866.050457][ T947] RIP: 0033:0x7f4243ed90d9 [ 2866.054711][ T947] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2866.074152][ T947] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2866.082395][ T947] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2866.090207][ T947] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2866.098016][ T947] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:42:14 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 83) 07:42:14 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 07:42:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) 07:42:14 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000010500000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xe000000, 0x10, 0x0}, 0x80) 07:42:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8201, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8201, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:14 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000600000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2866.105831][ T947] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2866.113642][ T947] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2866.121454][ T947] 07:42:14 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 07:42:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x10000000, 0x10, 0x0}, 0x80) 07:42:14 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000700000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) [ 2866.159514][ T989] FAULT_INJECTION: forcing a failure. [ 2866.159514][ T989] name failslab, interval 1, probability 0, space 0, times 0 [ 2866.180832][ T989] CPU: 1 PID: 989 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2866.192123][ T989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2866.202017][ T989] Call Trace: [ 2866.205145][ T989] [ 2866.207922][ T989] dump_stack_lvl+0x151/0x1b7 [ 2866.212434][ T989] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2866.217732][ T989] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2866.223980][ T989] dump_stack+0x15/0x17 [ 2866.227969][ T989] should_fail+0x3c0/0x510 [ 2866.232224][ T989] __should_failslab+0x9f/0xe0 [ 2866.236824][ T989] should_failslab+0x9/0x20 [ 2866.241162][ T989] kmem_cache_alloc+0x4f/0x2f0 [ 2866.245760][ T989] ? anon_vma_fork+0xf7/0x4f0 [ 2866.250271][ T989] anon_vma_fork+0xf7/0x4f0 [ 2866.254611][ T989] ? anon_vma_name+0x43/0x70 [ 2866.259035][ T989] dup_mmap+0x750/0xea0 [ 2866.263031][ T989] ? __delayed_free_task+0x20/0x20 [ 2866.267977][ T989] ? mm_init+0x807/0x960 [ 2866.272054][ T989] dup_mm+0x91/0x330 [ 2866.275787][ T989] copy_mm+0x108/0x1b0 [ 2866.279694][ T989] copy_process+0x1295/0x3250 [ 2866.284207][ T989] ? proc_fail_nth_write+0x213/0x290 [ 2866.289327][ T989] ? proc_fail_nth_read+0x220/0x220 [ 2866.294364][ T989] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2866.299306][ T989] ? vfs_write+0x9af/0x1050 [ 2866.303645][ T989] ? vmacache_update+0xb7/0x120 [ 2866.308335][ T989] kernel_clone+0x22d/0x990 [ 2866.312673][ T989] ? file_end_write+0x1b0/0x1b0 [ 2866.317358][ T989] ? __kasan_check_write+0x14/0x20 [ 2866.322305][ T989] ? create_io_thread+0x1e0/0x1e0 [ 2866.327166][ T989] ? __mutex_lock_slowpath+0x10/0x10 [ 2866.332288][ T989] __x64_sys_clone+0x289/0x310 [ 2866.336890][ T989] ? __do_sys_vfork+0x130/0x130 [ 2866.341574][ T989] ? debug_smp_processor_id+0x17/0x20 [ 2866.346787][ T989] do_syscall_64+0x44/0xd0 [ 2866.351035][ T989] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2866.356763][ T989] RIP: 0033:0x7f4243ed90d9 [ 2866.361019][ T989] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2866.380456][ T989] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2866.388702][ T989] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2866.396513][ T989] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 07:42:14 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 84) 07:42:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x30, 0x30, 0x5f]}}, &(0x7f0000000100)=""/232, 0x32, 0xe8, 0x1}, 0x20) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) 07:42:14 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) 07:42:14 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000900000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x11000000, 0x10, 0x0}, 0x80) 07:42:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={&(0x7f0000000000)=""/207, 0xcf, 0x0, &(0x7f0000000100)=""/29, 0x1d}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r2, 0x4) 07:42:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x30, 0x30, 0x5f]}}, &(0x7f0000000100)=""/232, 0x32, 0xe8, 0x1}, 0x20) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) write$cgroup_pressure(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) [ 2866.404328][ T989] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2866.412136][ T989] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2866.419946][ T989] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2866.427758][ T989] 07:42:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x12000000, 0x10, 0x0}, 0x80) 07:42:14 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000a00000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={&(0x7f0000000000)=""/207, 0xcf, 0x0, &(0x7f0000000100)=""/29, 0x1d}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r2, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r1) (async) close(r0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={&(0x7f0000000000)=""/207, 0xcf, 0x0, &(0x7f0000000100)=""/29, 0x1d}}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r2, 0x4) (async) 07:42:14 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(r2) (async) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) (async) 07:42:14 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000b00000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2866.454122][ T1006] FAULT_INJECTION: forcing a failure. [ 2866.454122][ T1006] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2866.472748][ T1006] CPU: 1 PID: 1006 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2866.484119][ T1006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2866.494097][ T1006] Call Trace: [ 2866.497219][ T1006] [ 2866.499999][ T1006] dump_stack_lvl+0x151/0x1b7 [ 2866.504512][ T1006] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2866.509806][ T1006] ? stack_trace_save+0x1f0/0x1f0 [ 2866.514667][ T1006] ? __kernel_text_address+0x9a/0x110 [ 2866.519873][ T1006] dump_stack+0x15/0x17 [ 2866.523869][ T1006] should_fail+0x3c0/0x510 [ 2866.528119][ T1006] should_fail_alloc_page+0x58/0x70 [ 2866.533150][ T1006] __alloc_pages+0x1de/0x7c0 [ 2866.537578][ T1006] ? stack_trace_save+0x12d/0x1f0 [ 2866.542442][ T1006] ? stack_trace_snprint+0x100/0x100 [ 2866.547558][ T1006] ? __count_vm_events+0x30/0x30 [ 2866.552328][ T1006] ? __kasan_slab_alloc+0xc4/0xe0 [ 2866.557188][ T1006] ? __kasan_slab_alloc+0xb2/0xe0 [ 2866.562052][ T1006] ? kmem_cache_alloc+0x189/0x2f0 [ 2866.566911][ T1006] ? anon_vma_fork+0x1b9/0x4f0 [ 2866.571515][ T1006] get_zeroed_page+0x19/0x40 [ 2866.575941][ T1006] __pud_alloc+0x8b/0x260 [ 2866.580104][ T1006] ? do_handle_mm_fault+0x2370/0x2370 [ 2866.585316][ T1006] copy_page_range+0xd9e/0x1090 [ 2866.590003][ T1006] ? pfn_valid+0x1e0/0x1e0 [ 2866.594249][ T1006] dup_mmap+0x99f/0xea0 [ 2866.598243][ T1006] ? __delayed_free_task+0x20/0x20 [ 2866.603186][ T1006] ? mm_init+0x807/0x960 [ 2866.607272][ T1006] dup_mm+0x91/0x330 [ 2866.610998][ T1006] copy_mm+0x108/0x1b0 [ 2866.614905][ T1006] copy_process+0x1295/0x3250 [ 2866.619418][ T1006] ? proc_fail_nth_write+0x213/0x290 [ 2866.624539][ T1006] ? proc_fail_nth_read+0x220/0x220 [ 2866.629572][ T1006] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2866.634520][ T1006] ? vfs_write+0x9af/0x1050 [ 2866.638860][ T1006] ? vmacache_update+0xb7/0x120 [ 2866.643546][ T1006] kernel_clone+0x22d/0x990 [ 2866.647885][ T1006] ? file_end_write+0x1b0/0x1b0 [ 2866.652570][ T1006] ? __kasan_check_write+0x14/0x20 [ 2866.657519][ T1006] ? create_io_thread+0x1e0/0x1e0 [ 2866.662379][ T1006] ? __mutex_lock_slowpath+0x10/0x10 [ 2866.667501][ T1006] __x64_sys_clone+0x289/0x310 [ 2866.672101][ T1006] ? __do_sys_vfork+0x130/0x130 [ 2866.676791][ T1006] ? debug_smp_processor_id+0x17/0x20 [ 2866.681995][ T1006] do_syscall_64+0x44/0xd0 [ 2866.686248][ T1006] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2866.691975][ T1006] RIP: 0033:0x7f4243ed90d9 [ 2866.696232][ T1006] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2866.715672][ T1006] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2866.723915][ T1006] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2866.731725][ T1006] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2866.739538][ T1006] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2866.747348][ T1006] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:42:15 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 85) 07:42:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x18000000, 0x10, 0x0}, 0x80) 07:42:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={&(0x7f0000000000)=""/207, 0xcf, 0x0, &(0x7f0000000100)=""/29, 0x1d}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r2, 0x4) 07:42:15 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000c00000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x30, 0x30, 0x5f]}}, &(0x7f0000000100)=""/232, 0x32, 0xe8, 0x1}, 0x20) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x30, 0x30, 0x5f]}}, &(0x7f0000000100)=""/232, 0x32, 0xe8, 0x1}, 0x20) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) (async) 07:42:15 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(r2) (async) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) (async) 07:42:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000009) 07:42:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r2}, 0xc) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)=""/28) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x20000000, 0x10, 0x0}, 0x80) 07:42:15 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000d00000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2866.755162][ T1006] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2866.762973][ T1006] 07:42:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x25000000, 0x10, 0x0}, 0x80) 07:42:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r2}, 0xc) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)=""/28) (async) write$cgroup_pressure(r0, 0x0, 0x0) [ 2866.807401][ T1060] FAULT_INJECTION: forcing a failure. [ 2866.807401][ T1060] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2866.823654][ T1060] CPU: 1 PID: 1060 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2866.835016][ T1060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2866.844910][ T1060] Call Trace: [ 2866.848036][ T1060] [ 2866.850813][ T1060] dump_stack_lvl+0x151/0x1b7 [ 2866.855328][ T1060] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2866.860622][ T1060] ? __kasan_check_write+0x14/0x20 [ 2866.865564][ T1060] ? __set_page_owner+0x2ee/0x310 [ 2866.870426][ T1060] dump_stack+0x15/0x17 [ 2866.874418][ T1060] should_fail+0x3c0/0x510 [ 2866.878669][ T1060] should_fail_alloc_page+0x58/0x70 [ 2866.883704][ T1060] __alloc_pages+0x1de/0x7c0 [ 2866.888128][ T1060] ? __count_vm_events+0x30/0x30 [ 2866.892906][ T1060] ? __count_vm_events+0x30/0x30 [ 2866.897677][ T1060] ? __kasan_check_write+0x14/0x20 [ 2866.902624][ T1060] ? _raw_spin_lock+0xa3/0x1b0 [ 2866.907222][ T1060] __pmd_alloc+0xb1/0x550 [ 2866.911389][ T1060] ? kmem_cache_alloc+0x189/0x2f0 [ 2866.916250][ T1060] ? anon_vma_fork+0x1b9/0x4f0 [ 2866.920851][ T1060] ? __pud_alloc+0x260/0x260 [ 2866.925281][ T1060] ? __pud_alloc+0x218/0x260 [ 2866.929702][ T1060] ? do_handle_mm_fault+0x2370/0x2370 [ 2866.934914][ T1060] copy_page_range+0xd04/0x1090 [ 2866.939606][ T1060] ? pfn_valid+0x1e0/0x1e0 [ 2866.943852][ T1060] dup_mmap+0x99f/0xea0 [ 2866.947841][ T1060] ? __delayed_free_task+0x20/0x20 [ 2866.952788][ T1060] ? mm_init+0x807/0x960 [ 2866.956868][ T1060] dup_mm+0x91/0x330 [ 2866.960599][ T1060] copy_mm+0x108/0x1b0 [ 2866.964507][ T1060] copy_process+0x1295/0x3250 [ 2866.969018][ T1060] ? proc_fail_nth_write+0x213/0x290 [ 2866.974138][ T1060] ? proc_fail_nth_read+0x220/0x220 [ 2866.979179][ T1060] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2866.984121][ T1060] ? vfs_write+0x9af/0x1050 [ 2866.988460][ T1060] ? vmacache_update+0xb7/0x120 [ 2866.993145][ T1060] kernel_clone+0x22d/0x990 [ 2866.997484][ T1060] ? file_end_write+0x1b0/0x1b0 [ 2867.002171][ T1060] ? __kasan_check_write+0x14/0x20 [ 2867.007119][ T1060] ? create_io_thread+0x1e0/0x1e0 [ 2867.011978][ T1060] ? __mutex_lock_slowpath+0x10/0x10 [ 2867.017101][ T1060] __x64_sys_clone+0x289/0x310 [ 2867.021699][ T1060] ? __do_sys_vfork+0x130/0x130 [ 2867.026390][ T1060] ? debug_smp_processor_id+0x17/0x20 [ 2867.031595][ T1060] do_syscall_64+0x44/0xd0 [ 2867.035849][ T1060] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2867.041576][ T1060] RIP: 0033:0x7f4243ed90d9 [ 2867.045829][ T1060] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2867.065269][ T1060] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2867.073515][ T1060] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2867.081325][ T1060] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2867.089137][ T1060] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2867.096946][ T1060] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 07:42:15 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 86) 07:42:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x40000000, 0x10, 0x0}, 0x80) 07:42:15 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000e00000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x5, 0x5, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (rerun: 32) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @exit, @exit], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x16, &(0x7f00000005c0)=""/22, 0x20900, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0x3db, 0x74e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1, r1, 0xffffffffffffffff, r1, r1, r1, r1, r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x0, 0x0, 0x6f, 0x0, &(0x7f0000000800)=""/111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8001}, 0x48) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r2}, 0xc) (async) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)=""/28) (async) write$cgroup_pressure(r0, 0x0, 0x0) 07:42:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000009) 07:42:15 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup_int(r1, &(0x7f0000000080)='memory.swap.high\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) mkdirat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r0}, 0x8) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) [ 2867.104759][ T1060] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2867.112573][ T1060] 07:42:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000009) 07:42:15 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000f00000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x48000000, 0x10, 0x0}, 0x80) 07:42:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c000000, 0x10, 0x0}, 0x80) 07:42:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x64000000, 0x10, 0x0}, 0x80) 07:42:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x66010000, 0x10, 0x0}, 0x80) [ 2867.167293][ T1092] FAULT_INJECTION: forcing a failure. [ 2867.167293][ T1092] name failslab, interval 1, probability 0, space 0, times 0 [ 2867.182709][ T1092] CPU: 1 PID: 1092 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2867.194084][ T1092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2867.203977][ T1092] Call Trace: [ 2867.207109][ T1092] [ 2867.209879][ T1092] dump_stack_lvl+0x151/0x1b7 [ 2867.214394][ T1092] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2867.219687][ T1092] ? do_syscall_64+0x44/0xd0 [ 2867.224109][ T1092] dump_stack+0x15/0x17 [ 2867.228100][ T1092] should_fail+0x3c0/0x510 [ 2867.232353][ T1092] __should_failslab+0x9f/0xe0 [ 2867.236953][ T1092] should_failslab+0x9/0x20 [ 2867.241293][ T1092] kmem_cache_alloc+0x4f/0x2f0 [ 2867.245890][ T1092] ? anon_vma_clone+0xa1/0x4f0 [ 2867.250496][ T1092] anon_vma_clone+0xa1/0x4f0 [ 2867.254917][ T1092] anon_vma_fork+0x91/0x4f0 [ 2867.259258][ T1092] ? anon_vma_name+0x4c/0x70 [ 2867.263684][ T1092] dup_mmap+0x750/0xea0 [ 2867.267677][ T1092] ? __delayed_free_task+0x20/0x20 [ 2867.272624][ T1092] ? mm_init+0x807/0x960 [ 2867.276702][ T1092] dup_mm+0x91/0x330 [ 2867.280434][ T1092] copy_mm+0x108/0x1b0 [ 2867.284341][ T1092] copy_process+0x1295/0x3250 [ 2867.288854][ T1092] ? proc_fail_nth_write+0x213/0x290 [ 2867.293978][ T1092] ? proc_fail_nth_read+0x220/0x220 [ 2867.299008][ T1092] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2867.303955][ T1092] ? vfs_write+0x9af/0x1050 [ 2867.308296][ T1092] ? vmacache_update+0xb7/0x120 [ 2867.312982][ T1092] kernel_clone+0x22d/0x990 [ 2867.317321][ T1092] ? file_end_write+0x1b0/0x1b0 [ 2867.322007][ T1092] ? __kasan_check_write+0x14/0x20 [ 2867.326954][ T1092] ? create_io_thread+0x1e0/0x1e0 [ 2867.331819][ T1092] ? __mutex_lock_slowpath+0x10/0x10 [ 2867.336936][ T1092] __x64_sys_clone+0x289/0x310 [ 2867.341538][ T1092] ? __do_sys_vfork+0x130/0x130 [ 2867.346221][ T1092] ? debug_smp_processor_id+0x17/0x20 [ 2867.351432][ T1092] do_syscall_64+0x44/0xd0 [ 2867.355682][ T1092] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2867.361412][ T1092] RIP: 0033:0x7f4243ed90d9 [ 2867.365664][ T1092] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2867.385106][ T1092] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2867.393352][ T1092] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2867.401160][ T1092] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2867.408971][ T1092] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:42:15 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 87) 07:42:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x68000000, 0x10, 0x0}, 0x80) 07:42:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x121040, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x7, 0x1, 0x9, 0x6, 0x0, 0x4, 0x400, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1000, 0x3, 0x401, 0x0, 0x4, 0xfff, 0xffff, 0x0, 0x8, 0x0, 0x10001}) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FREEZING\x00', 0x9) 07:42:15 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001100000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r2, &(0x7f00000007c0)={&(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x58}, 0x48000) close(r0) 07:42:15 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup_int(r1, &(0x7f0000000080)='memory.swap.high\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) mkdirat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r0}, 0x8) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) openat$cgroup_int(r1, &(0x7f0000000080)='memory.swap.high\x00', 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) (async) mkdirat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x1ff) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r0}, 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) (async) openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) (async) 07:42:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x121040, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x7, 0x1, 0x9, 0x6, 0x0, 0x4, 0x400, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1000, 0x3, 0x401, 0x0, 0x4, 0xfff, 0xffff, 0x0, 0x8, 0x0, 0x10001}) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FREEZING\x00', 0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x121040, 0x0) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(r1) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x7, 0x1, 0x9, 0x6, 0x0, 0x4, 0x400, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1000, 0x3, 0x401, 0x0, 0x4, 0xfff, 0xffff, 0x0, 0x8, 0x0, 0x10001}) (async) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FREEZING\x00', 0x9) (async) 07:42:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x6c000000, 0x10, 0x0}, 0x80) 07:42:15 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001200000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2867.416783][ T1092] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2867.424593][ T1092] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2867.432411][ T1092] 07:42:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r2, &(0x7f00000007c0)={&(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x58}, 0x48000) (async) close(r0) 07:42:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x121040, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x7, 0x1, 0x9, 0x6, 0x0, 0x4, 0x400, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1000, 0x3, 0x401, 0x0, 0x4, 0xfff, 0xffff, 0x0, 0x8, 0x0, 0x10001}) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FREEZING\x00', 0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x121040, 0x0) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(r1) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x7, 0x1, 0x9, 0x6, 0x0, 0x4, 0x400, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1000, 0x3, 0x401, 0x0, 0x4, 0xfff, 0xffff, 0x0, 0x8, 0x0, 0x10001}) (async) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FREEZING\x00', 0x9) (async) 07:42:15 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup_int(r1, &(0x7f0000000080)='memory.swap.high\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) mkdirat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r0}, 0x8) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) openat$cgroup_int(r1, &(0x7f0000000080)='memory.swap.high\x00', 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) (async) mkdirat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x1ff) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) (async) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r0}, 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) (async) openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) (async) [ 2867.495056][ T1149] FAULT_INJECTION: forcing a failure. [ 2867.495056][ T1149] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2867.513341][ T1149] CPU: 0 PID: 1149 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2867.524708][ T1149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2867.534602][ T1149] Call Trace: [ 2867.537723][ T1149] [ 2867.540500][ T1149] dump_stack_lvl+0x151/0x1b7 [ 2867.545017][ T1149] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2867.550309][ T1149] dump_stack+0x15/0x17 [ 2867.554300][ T1149] should_fail+0x3c0/0x510 [ 2867.558554][ T1149] should_fail_alloc_page+0x58/0x70 [ 2867.563587][ T1149] __alloc_pages+0x1de/0x7c0 [ 2867.568013][ T1149] ? __count_vm_events+0x30/0x30 [ 2867.572788][ T1149] ? dup_mm+0x91/0x330 [ 2867.576692][ T1149] ? copy_mm+0x108/0x1b0 [ 2867.580771][ T1149] ? copy_process+0x1295/0x3250 [ 2867.585460][ T1149] ? kernel_clone+0x22d/0x990 [ 2867.589974][ T1149] ? __x64_sys_clone+0x289/0x310 [ 2867.594745][ T1149] pte_alloc_one+0x73/0x1b0 [ 2867.599088][ T1149] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2867.604123][ T1149] ? __kasan_check_write+0x14/0x20 [ 2867.609067][ T1149] ? __set_page_owner+0x2ee/0x310 [ 2867.613926][ T1149] __pte_alloc+0x86/0x350 [ 2867.618091][ T1149] ? post_alloc_hook+0x1ab/0x1b0 [ 2867.622867][ T1149] ? free_pgtables+0x210/0x210 [ 2867.627468][ T1149] ? get_page_from_freelist+0x38b/0x400 [ 2867.632846][ T1149] copy_pte_range+0x1b1f/0x20b0 [ 2867.637537][ T1149] ? __kunmap_atomic+0x80/0x80 [ 2867.642134][ T1149] ? __pud_alloc+0x260/0x260 [ 2867.646558][ T1149] ? __pud_alloc+0x218/0x260 [ 2867.650990][ T1149] ? do_handle_mm_fault+0x2370/0x2370 [ 2867.656195][ T1149] copy_page_range+0xc1e/0x1090 [ 2867.660883][ T1149] ? pfn_valid+0x1e0/0x1e0 [ 2867.665135][ T1149] dup_mmap+0x99f/0xea0 [ 2867.669127][ T1149] ? __delayed_free_task+0x20/0x20 [ 2867.674072][ T1149] ? mm_init+0x807/0x960 [ 2867.678151][ T1149] dup_mm+0x91/0x330 [ 2867.681883][ T1149] copy_mm+0x108/0x1b0 [ 2867.685791][ T1149] copy_process+0x1295/0x3250 [ 2867.690305][ T1149] ? proc_fail_nth_write+0x213/0x290 [ 2867.695425][ T1149] ? proc_fail_nth_read+0x220/0x220 [ 2867.700467][ T1149] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2867.705409][ T1149] ? vfs_write+0x9af/0x1050 [ 2867.709872][ T1149] ? vmacache_update+0xb7/0x120 [ 2867.714556][ T1149] kernel_clone+0x22d/0x990 [ 2867.718893][ T1149] ? file_end_write+0x1b0/0x1b0 [ 2867.723579][ T1149] ? __kasan_check_write+0x14/0x20 [ 2867.728532][ T1149] ? create_io_thread+0x1e0/0x1e0 [ 2867.733388][ T1149] ? __mutex_lock_slowpath+0x10/0x10 [ 2867.738509][ T1149] __x64_sys_clone+0x289/0x310 [ 2867.743107][ T1149] ? __do_sys_vfork+0x130/0x130 [ 2867.747795][ T1149] ? debug_smp_processor_id+0x17/0x20 [ 2867.753004][ T1149] do_syscall_64+0x44/0xd0 [ 2867.757256][ T1149] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2867.762983][ T1149] RIP: 0033:0x7f4243ed90d9 [ 2867.767243][ T1149] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2867.786699][ T1149] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 07:42:16 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 88) 07:42:16 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001800000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x74000000, 0x10, 0x0}, 0x80) 07:42:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r2, &(0x7f00000007c0)={&(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x58}, 0x48000) (async) close(r0) 07:42:16 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='blkio.reset_stats\x00', 0x2, 0x0) 07:42:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000040)={'dvmrp0\x00', @remote}) 07:42:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000040)={'dvmrp0\x00', @remote}) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) (async) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000040)={'dvmrp0\x00', @remote}) (async) 07:42:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x7a000000, 0x10, 0x0}, 0x80) 07:42:16 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001f00000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2867.794922][ T1149] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2867.802738][ T1149] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2867.810544][ T1149] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2867.818354][ T1149] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2867.826166][ T1149] R13: 00007ffc68cedaef R14: 00007f4242c4c300 R15: 0000000000022000 [ 2867.833982][ T1149] 07:42:16 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) close(r1) 07:42:16 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000002000000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x80ffffff, 0x10, 0x0}, 0x80) [ 2867.888225][ T1191] FAULT_INJECTION: forcing a failure. [ 2867.888225][ T1191] name failslab, interval 1, probability 0, space 0, times 0 [ 2867.903249][ T1191] CPU: 0 PID: 1191 Comm: syz-executor.4 Tainted: G B 5.15.77-syzkaller-00764-g7048384c9872 #0 [ 2867.914623][ T1191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2867.924518][ T1191] Call Trace: [ 2867.927639][ T1191] [ 2867.930417][ T1191] dump_stack_lvl+0x151/0x1b7 [ 2867.934927][ T1191] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2867.940222][ T1191] dump_stack+0x15/0x17 [ 2867.944213][ T1191] should_fail+0x3c0/0x510 [ 2867.948466][ T1191] __should_failslab+0x9f/0xe0 [ 2867.953066][ T1191] should_failslab+0x9/0x20 [ 2867.957405][ T1191] kmem_cache_alloc+0x4f/0x2f0 [ 2867.962005][ T1191] ? anon_vma_clone+0xa1/0x4f0 [ 2867.966605][ T1191] anon_vma_clone+0xa1/0x4f0 [ 2867.971032][ T1191] anon_vma_fork+0x91/0x4f0 [ 2867.975371][ T1191] ? anon_vma_name+0x4c/0x70 [ 2867.979797][ T1191] dup_mmap+0x750/0xea0 [ 2867.983790][ T1191] ? __delayed_free_task+0x20/0x20 [ 2867.988736][ T1191] ? mm_init+0x807/0x960 [ 2867.992815][ T1191] dup_mm+0x91/0x330 [ 2867.996549][ T1191] copy_mm+0x108/0x1b0 [ 2868.000453][ T1191] copy_process+0x1295/0x3250 [ 2868.004969][ T1191] ? proc_fail_nth_write+0x213/0x290 [ 2868.010087][ T1191] ? proc_fail_nth_read+0x220/0x220 [ 2868.015121][ T1191] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2868.020069][ T1191] ? vfs_write+0x9af/0x1050 [ 2868.024416][ T1191] ? vmacache_update+0xb7/0x120 [ 2868.029095][ T1191] kernel_clone+0x22d/0x990 [ 2868.033440][ T1191] ? file_end_write+0x1b0/0x1b0 [ 2868.038120][ T1191] ? __kasan_check_write+0x14/0x20 [ 2868.043068][ T1191] ? create_io_thread+0x1e0/0x1e0 [ 2868.047927][ T1191] ? __mutex_lock_slowpath+0x10/0x10 [ 2868.053048][ T1191] __x64_sys_clone+0x289/0x310 [ 2868.057650][ T1191] ? __do_sys_vfork+0x130/0x130 [ 2868.062336][ T1191] ? debug_smp_processor_id+0x17/0x20 [ 2868.067547][ T1191] do_syscall_64+0x44/0xd0 [ 2868.071798][ T1191] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2868.077523][ T1191] RIP: 0033:0x7f4243ed90d9 [ 2868.081782][ T1191] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2868.101219][ T1191] RSP: 002b:00007f4242c4c118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2868.109466][ T1191] RAX: ffffffffffffffda RBX: 00007f4243ff8f80 RCX: 00007f4243ed90d9 [ 2868.117275][ T1191] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000032160000 [ 2868.125091][ T1191] RBP: 00007f4242c4c1d0 R08: 0000000000000000 R09: 0000000000000000 07:42:16 executing program 4: syz_clone(0x32160000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 89) 07:42:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x85ffffff, 0x10, 0x0}, 0x80) 07:42:16 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) (async) close(r1) 07:42:16 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000002500000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:16 executing program 3: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x38028000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='blkio.reset_stats\x00', 0x2, 0x0) 07:42:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) write$cgroup_pressure(r0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000040)={'dvmrp0\x00', @remote}) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) (async) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) (async) write$cgroup_pressure(r0, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000003240)={'bridge0\x00', 0x400}) (async) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000040)={'dvmrp0\x00', @remote}) (async) 07:42:16 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) close(r1) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) (async) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ac0)) (async) close(r2) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) (async) close(r1) (async) 07:42:16 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000003c00000000000000470000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:42:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@raw=[@call, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xde, &(0x7f0000000240)=""/222, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x90ffffff, 0x10, 0x0}, 0x80) 07:42:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0xffffffff, 0x0, 0x5, 0x10, 0x1, 0x9a2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x3}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000001840)="04abe0fa5385342a69dc9a7ee8e29553b32f0cb568b517046dccf2b80f8c77ecc91010505583ecb21e1e601a47751d69eef801bf42ab2053ff159aa784aa12c7f89a4e965dbd1593def5f4f91ee78472c35b07de8f966cd54ed4b08cff3bf75ce94cd0890b461e07f67a95bb4fd8c2024b316a69f4e01ed164ade86d4265520729789a33e3cf03cb50068014172b8d7d093dcc57909a4b54f892ba42d1ef57906b129e2fd5e990ea40deddbc0642895be911f6", &(0x7f0000000040)=""/110, &(0x7f0000000180)="2210df134d75b1cdd33e498b0afb247a5b6fc44d08173f0090171a5b0036f12c4d0a9e12453a930914fd83a3602935fa1fb5f486d540979030106140e9af7436032fedc3c3b275405173b62914ae9b51e7ac614b12f084e91ec