='./file0/file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 04:06:31 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x1) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0xb}, 0x80) 04:06:31 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x8) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x10a) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) r0 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 04:06:31 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x8) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x10a) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) r0 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0xc}, 0x80) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc2020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x1) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) 04:06:31 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x8) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x10a) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) r0 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x2000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc2030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0xd}, 0x80) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080), 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)=""/121, 0x79}, {&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000240)=""/224, 0xe0}, {&(0x7f0000000340)=""/176, 0xb0}], 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000823b2ad1f0c6cf", @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xf0}, 0x40000000) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x1c8) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc2040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 3: mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x20) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x1c8) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc3000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0xe}, 0x80) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080), 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)=""/121, 0x79}, {&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000240)=""/224, 0xe0}, {&(0x7f0000000340)=""/176, 0xb0}], 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000823b2ad1f0c6cf", @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xf0}, 0x40000000) (async, rerun: 32) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async, rerun: 32) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x4000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 3: mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x20) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x20) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc3010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x11}, 0x80) 04:06:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x1c8) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080), 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)=""/121, 0x79}, {&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000240)=""/224, 0xe0}, {&(0x7f0000000340)=""/176, 0xb0}], 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000823b2ad1f0c6cf", @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xf0}, 0x40000000) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0xa) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f0000000180)=""/183, 0xb7}], 0x2, &(0x7f0000000280)=""/135, 0x87}, 0xa021) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x12}, 0x80) 04:06:31 executing program 3: mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x20) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x20) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0/file0\x00', 0xc) unlink(&(0x7f0000004700)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000400), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000440)={'veth0_to_team', 0x32, 0x31}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x2) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0xd, &(0x7f0000000100)=ANY=[@ANYBLOB="5522f4ff00000000950000000000000018510000070000000000000000000000186000000f000000000000007f0000009c38d9ff100000001800000000800000000000000000000418260000", @ANYRES32=0x1, @ANYBLOB="000000ff03000000000000000500"/24], &(0x7f0000000180)='syzkaller\x00', 0x7, 0xb9, &(0x7f00000001c0)=""/185, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x8, 0x80000000, 0x784}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f00000000c0)='./file0/file0/file0\x00', r1}, 0x10) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc3020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) (async) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0xa) (async, rerun: 32) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f0000000180)=""/183, 0xb7}], 0x2, &(0x7f0000000280)=""/135, 0x87}, 0xa021) (rerun: 32) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x4c00, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x29}, 0x80) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0/file0\x00', 0xc) unlink(&(0x7f0000004700)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000400), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000440)={'veth0_to_team', 0x32, 0x31}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x2) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0xd, &(0x7f0000000100)=ANY=[@ANYBLOB="5522f4ff00000000950000000000000018510000070000000000000000000000186000000f000000000000007f0000009c38d9ff100000001800000000800000000000000000000418260000", @ANYRES32=0x1, @ANYBLOB="000000ff03000000000000000500"/24], &(0x7f0000000180)='syzkaller\x00', 0x7, 0xb9, &(0x7f00000001c0)=""/185, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x8, 0x80000000, 0x784}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f00000000c0)='./file0/file0/file0\x00', r1}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0/file0\x00', 0xc) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) unlink(&(0x7f0000000000)='./file0\x00') (async) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000400), 0x2, 0x0) (async) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000440)={'veth0_to_team', 0x32, 0x31}, 0x10) (async) mkdir(&(0x7f0000000080)='./file0\x00', 0x2) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0xd, &(0x7f0000000100)=ANY=[@ANYBLOB="5522f4ff00000000950000000000000018510000070000000000000000000000186000000f000000000000007f0000009c38d9ff100000001800000000800000000000000000000418260000", @ANYRES32=0x1, @ANYBLOB="000000ff03000000000000000500"/24], &(0x7f0000000180)='syzkaller\x00', 0x7, 0xb9, &(0x7f00000001c0)=""/185, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x8, 0x80000000, 0x784}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f00000000c0)='./file0/file0/file0\x00', r1}, 0x10) (async) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc3030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) (async) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0xa) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f0000000180)=""/183, 0xb7}], 0x2, &(0x7f0000000280)=""/135, 0x87}, 0xa021) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x70}, 0x80) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async, rerun: 64) mkdir(&(0x7f0000000040)='./file0/file0/file0\x00', 0xc) (async, rerun: 64) unlink(&(0x7f0000004700)='./file0\x00') (async) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000400), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000440)={'veth0_to_team', 0x32, 0x31}, 0x10) (async) mkdir(&(0x7f0000000080)='./file0\x00', 0x2) (async) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0xd, &(0x7f0000000100)=ANY=[@ANYBLOB="5522f4ff00000000950000000000000018510000070000000000000000000000186000000f000000000000007f0000009c38d9ff100000001800000000800000000000000000000418260000", @ANYRES32=0x1, @ANYBLOB="000000ff03000000000000000500"/24], &(0x7f0000000180)='syzkaller\x00', 0x7, 0xb9, &(0x7f00000001c0)=""/185, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x8, 0x80000000, 0x784}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f00000000c0)='./file0/file0/file0\x00', r1}, 0x10) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc3040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) socketpair(0x21, 0x800, 0x80, &(0x7f0000000000)) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x5000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc4000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x2}, 0x80) 04:06:31 executing program 0: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0/file0\x00') recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)=""/235, 0xeb}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000081400000000000000fca94732d3a6060100000001000000", @ANYRES32, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0x78}, 0x1) 04:06:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)) (async) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) (async) socketpair(0x21, 0x800, 0x80, &(0x7f0000000000)) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x3}, 0x80) 04:06:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xe, 0x9, 0x8000, 0x7ff, 0x1, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r0, &(0x7f0000000000)="3e790faaaf29206e2e0a57d83a649e71b944457aba7cbdc325efa921260a08d8304cd72fc34a8a71140a0cf316335ac73d6892e7da9e8fea51a8447ccfe686", &(0x7f0000000100)=""/134}, 0x20) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x88) 04:06:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xe, 0x9, 0x8000, 0x7ff, 0x1, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r0, &(0x7f0000000000)="3e790faaaf29206e2e0a57d83a649e71b944457aba7cbdc325efa921260a08d8304cd72fc34a8a71140a0cf316335ac73d6892e7da9e8fea51a8447ccfe686", &(0x7f0000000100)=""/134}, 0x20) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x88) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x4}, 0x80) 04:06:31 executing program 0: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0/file0\x00') recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)=""/235, 0xeb}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000081400000000000000fca94732d3a6060100000001000000", @ANYRES32, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0x78}, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) (async) openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000000000)='./file0/file0\x00') (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)=""/235, 0xeb}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000081400000000000000fca94732d3a6060100000001000000", @ANYRES32, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0x78}, 0x1) (async) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x5}, 0x80) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x5902, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc4010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 0: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0/file0\x00') recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)=""/235, 0xeb}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000081400000000000000fca94732d3a6060100000001000000", @ANYRES32, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0x78}, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) (async) openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000000000)='./file0/file0\x00') (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)=""/235, 0xeb}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000081400000000000000fca94732d3a6060100000001000000", @ANYRES32, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000010000000000000000100000001000000"], 0x78}, 0x1) (async) 04:06:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)) (async) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) (async) socketpair(0x21, 0x800, 0x80, &(0x7f0000000000)) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xe, 0x9, 0x8000, 0x7ff, 0x1, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r0, &(0x7f0000000000)="3e790faaaf29206e2e0a57d83a649e71b944457aba7cbdc325efa921260a08d8304cd72fc34a8a71140a0cf316335ac73d6892e7da9e8fea51a8447ccfe686", &(0x7f0000000100)=""/134}, 0x20) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async, rerun: 64) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x88) (rerun: 64) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x6}, 0x80) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc4020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 0: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x81) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000200)={r0, &(0x7f00000000c0)="98f66e857709967665f34367e4c62a7659eb54f1aa3f56651c810020babb7c07437cd0f5c676a74d32a8948802262e1047873703728442f3c26aa606ded714f8d0d4a06d1f502355d18e89083f3a5de68562c7b074cbf8a3e8586f3cae8b7414e16ed1c55d67c9f10e33365bb3fd62b05402db5c9acd34ab32b6d170aab3d717e175c352cb6c152b8d9aba4e7020ee8ff6727a782e2bc49017623b170fbd25a6e96c9c2e9d3ed5781c134899573b8c48051a07f657f23545374314149373da38661f67b5598eb6a1571b5760f4381a20a46affc4455c", &(0x7f00000001c0)=""/57}, 0x20) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x7}, 0x80) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc4030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x3) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) 04:06:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x20) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0xc) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000b0d000000528600eb55716895000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1ff, 0x1, &(0x7f0000000180)=""/1, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x5, 0x6, 0x291}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000300)={r0, r1}, 0xc) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x7100, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x8}, 0x80) 04:06:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x20) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) mkdir(&(0x7f0000000080)='./file0\x00', 0xc) (async, rerun: 64) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000b0d000000528600eb55716895000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1ff, 0x1, &(0x7f0000000180)=""/1, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x5, 0x6, 0x291}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000300)={r0, r1}, 0xc) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x3) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc4040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 0: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x81) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000200)={r0, &(0x7f00000000c0)="98f66e857709967665f34367e4c62a7659eb54f1aa3f56651c810020babb7c07437cd0f5c676a74d32a8948802262e1047873703728442f3c26aa606ded714f8d0d4a06d1f502355d18e89083f3a5de68562c7b074cbf8a3e8586f3cae8b7414e16ed1c55d67c9f10e33365bb3fd62b05402db5c9acd34ab32b6d170aab3d717e175c352cb6c152b8d9aba4e7020ee8ff6727a782e2bc49017623b170fbd25a6e96c9c2e9d3ed5781c134899573b8c48051a07f657f23545374314149373da38661f67b5598eb6a1571b5760f4381a20a46affc4455c", &(0x7f00000001c0)=""/57}, 0x20) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x9}, 0x80) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x3) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) 04:06:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mkdir(&(0x7f00000000c0)='./file0\x00', 0x20) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) mkdir(&(0x7f0000000080)='./file0\x00', 0xc) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000b0d000000528600eb55716895000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1ff, 0x1, &(0x7f0000000180)=""/1, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x5, 0x6, 0x291}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000300)={r0, r1}, 0xc) 04:06:31 executing program 0: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x81) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000200)={r0, &(0x7f00000000c0)="98f66e857709967665f34367e4c62a7659eb54f1aa3f56651c810020babb7c07437cd0f5c676a74d32a8948802262e1047873703728442f3c26aa606ded714f8d0d4a06d1f502355d18e89083f3a5de68562c7b074cbf8a3e8586f3cae8b7414e16ed1c55d67c9f10e33365bb3fd62b05402db5c9acd34ab32b6d170aab3d717e175c352cb6c152b8d9aba4e7020ee8ff6727a782e2bc49017623b170fbd25a6e96c9c2e9d3ed5781c134899573b8c48051a07f657f23545374314149373da38661f67b5598eb6a1571b5760f4381a20a46affc4455c", &(0x7f00000001c0)=""/57}, 0x20) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc5000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x420000, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x1a0) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x7d02, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xa}, 0x80) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x420000, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x1a0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x420000, 0x0) (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x1a0) (async) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc5010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r0, 0x15, 0x1, 0x7f, &(0x7f0000000080)=[0x0, 0x0], 0x2}, 0x14) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x14}, 0x10) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xb}, 0x80) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x420000, 0x0) (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x1a0) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc5020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xc}, 0x80) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc5030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0xc503, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x20) mkdir(&(0x7f0000000040)='./file1\x00', 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000000)={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x10}, 0x10) 04:06:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r0, 0x15, 0x1, 0x7f, &(0x7f0000000080)=[0x0, 0x0], 0x2}, 0x14) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) (async, rerun: 64) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x14}, 0x10) (rerun: 64) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc5040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xd}, 0x80) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x20) (async) mkdir(&(0x7f0000000040)='./file1\x00', 0x80) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000000)={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x10}, 0x10) 04:06:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r0, 0x15, 0x1, 0x7f, &(0x7f0000000080)=[0x0, 0x0], 0x2}, 0x14) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x14}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r0, 0x15, 0x1, 0x7f, &(0x7f0000000080)=[0x0, 0x0], 0x2}, 0x14) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x14}, 0x10) (async) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc6000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x20) mkdir(&(0x7f0000000040)='./file1\x00', 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000000)={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x20) (async) mkdir(&(0x7f0000000040)='./file1\x00', 0x80) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000000)={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x10}, 0x10) (async) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xe}, 0x80) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0xcc03, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async, rerun: 32) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async, rerun: 32) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x32, 0x7, 0x10001, 0x811, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x3}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000100)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0xd, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xd}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff}], &(0x7f0000000000)='GPL\x00', 0x80000001, 0xb9, &(0x7f0000000180)=""/185, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x8e, 0x401}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x1, 0x1, 0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff]}, 0x80) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x34) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc6010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x10}, 0x80) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000001700)='GPL\x00', 0x4, 0xb0, &(0x7f0000000000)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0], 0x0, 0x8, &(0x7f0000000700)=[{}], 0x8, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/190, 0xbe}], 0x1, &(0x7f00000001c0)=""/188, 0xbc}, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0/file0\x00', 0x1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) 04:06:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x32, 0x7, 0x10001, 0x811, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x3}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000100)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0xd, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xd}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff}], &(0x7f0000000000)='GPL\x00', 0x80000001, 0xb9, &(0x7f0000000180)=""/185, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x8e, 0x401}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x1, 0x1, 0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff]}, 0x80) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x34) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x32, 0x7, 0x10001, 0x811, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x3}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000100)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0xd, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xd}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff}], &(0x7f0000000000)='GPL\x00', 0x80000001, 0xb9, &(0x7f0000000180)=""/185, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x8e, 0x401}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x1, 0x1, 0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff]}, 0x80) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x34) (async) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc6020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) unlink(&(0x7f0000004700)='./file0\x00') mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x11}, 0x80) 04:06:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x32, 0x7, 0x10001, 0x811, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x3}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000100)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0xd, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xd}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff}], &(0x7f0000000000)='GPL\x00', 0x80000001, 0xb9, &(0x7f0000000180)=""/185, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x8e, 0x401}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x1, 0x1, 0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff]}, 0x80) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x34) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x32, 0x7, 0x10001, 0x811, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x3}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000100)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0xd, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xd}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff}], &(0x7f0000000000)='GPL\x00', 0x80000001, 0xb9, &(0x7f0000000180)=""/185, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x8e, 0x401}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x1, 0x1, 0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff]}, 0x80) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x34) (async) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x12}, 0x80) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x30000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000001700)='GPL\x00', 0x4, 0xb0, &(0x7f0000000000)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0], 0x0, 0x8, &(0x7f0000000700)=[{}], 0x8, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/190, 0xbe}], 0x1, &(0x7f00000001c0)=""/188, 0xbc}, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0/file0\x00', 0x1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000001700)='GPL\x00', 0x4, 0xb0, &(0x7f0000000000)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0], 0x0, 0x8, &(0x7f0000000700)=[{}], 0x8, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/190, 0xbe}], 0x1, &(0x7f00000001c0)=""/188, 0xbc}, 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0/file0\x00', 0x1}, 0x10) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) (async) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc6030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000002c0)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r1, &(0x7f00000001c0)="30eeac001ff4e8dfcf3bb7014d36c3f20c0aeb3826037fd3dcdda28d39a2ac689990add81d5b19d348da410f36f60eaa495d9886951595e4"}, 0x20) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r2, r3, 0x0, 0x17, &(0x7f0000000300)='blkio.bfq.io_wait_time\x00'}, 0x30) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000280)) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000240)=0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x18}, 0x80) 04:06:31 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc6040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000001700)='GPL\x00', 0x4, 0xb0, &(0x7f0000000000)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0], 0x0, 0x8, &(0x7f0000000700)=[{}], 0x8, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/190, 0xbe}], 0x1, &(0x7f00000001c0)=""/188, 0xbc}, 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0/file0\x00', 0x1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x25}, 0x80) 04:06:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000002c0)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r1, &(0x7f00000001c0)="30eeac001ff4e8dfcf3bb7014d36c3f20c0aeb3826037fd3dcdda28d39a2ac689990add81d5b19d348da410f36f60eaa495d9886951595e4"}, 0x20) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) (async, rerun: 32) r2 = gettid() (rerun: 32) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r2, r3, 0x0, 0x17, &(0x7f0000000300)='blkio.bfq.io_wait_time\x00'}, 0x30) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000280)) (async, rerun: 32) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000240)=0x1) (rerun: 32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) (async) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x94) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x70000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc7000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000002c0)) (async) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r1, &(0x7f00000001c0)="30eeac001ff4e8dfcf3bb7014d36c3f20c0aeb3826037fd3dcdda28d39a2ac689990add81d5b19d348da410f36f60eaa495d9886951595e4"}, 0x20) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r2, r3, 0x0, 0x17, &(0x7f0000000300)='blkio.bfq.io_wait_time\x00'}, 0x30) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000280)) (async) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000240)=0x1) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) (async) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x41}, 0x80) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x94) 04:06:31 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc7010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x48}, 0x80) 04:06:31 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x1a7) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x224) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc7020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x94) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x94) (async) 04:06:31 executing program 1: mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x6) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x102000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) (async) mkdir(&(0x7f0000000080)='./file0\x00', 0x1a7) (async) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x224) (async) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x4c}, 0x80) 04:06:31 executing program 1: mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x2) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x6) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc7030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'perf_event'}, {0x2b, 'memory'}, {0x2d, 'cpuset'}, {0x2d, 'cpuset'}, {0x2b, 'memory'}, {0x0, 'memory'}, {0x2b, 'pids'}, {0x2d, 'memory'}]}, 0x42) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc7040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x64}, 0x80) 04:06:31 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) (async) mkdir(&(0x7f0000000080)='./file0\x00', 0x1a7) (async) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x224) unlink(&(0x7f0000004700)='./file0\x00') 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'perf_event'}, {0x2b, 'memory'}, {0x2d, 'cpuset'}, {0x2d, 'cpuset'}, {0x2b, 'memory'}, {0x0, 'memory'}, {0x2b, 'pids'}, {0x2d, 'memory'}]}, 0x42) 04:06:31 executing program 1: mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x2) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x6) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc8000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/253, 0xfd}, {&(0x7f0000000180)=""/197, 0xc5}], 0x2, &(0x7f0000000280)=""/129, 0x81}, 0x40010060) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x107000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x68}, 0x80) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc8010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x10, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @generic={0xe4, 0xd, 0x0, 0x4, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x37b5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @exit, @call={0x85, 0x0, 0x0, 0x3a}, @exit, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000100)='syzkaller\x00', 0x5, 0x48, &(0x7f0000000140)=""/72, 0x41100, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x3, 0x6, 0xeabb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff]}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f0000000000)='./file1\x00', r0}, 0x10) 04:06:31 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'perf_event'}, {0x2b, 'memory'}, {0x2d, 'cpuset'}, {0x2d, 'cpuset'}, {0x2b, 'memory'}, {0x0, 'memory'}, {0x2b, 'pids'}, {0x2d, 'memory'}]}, 0x42) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'perf_event'}, {0x2b, 'memory'}, {0x2d, 'cpuset'}, {0x2d, 'cpuset'}, {0x2b, 'memory'}, {0x0, 'memory'}, {0x2b, 'pids'}, {0x2d, 'memory'}]}, 0x42) (async) 04:06:31 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc8020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:31 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/253, 0xfd}, {&(0x7f0000000180)=""/197, 0xc5}], 0x2, &(0x7f0000000280)=""/129, 0x81}, 0x40010060) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x6c}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc8030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') (async, rerun: 32) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x10, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @generic={0xe4, 0xd, 0x0, 0x4, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x37b5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @exit, @call={0x85, 0x0, 0x0, 0x3a}, @exit, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000100)='syzkaller\x00', 0x5, 0x48, &(0x7f0000000140)=""/72, 0x41100, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x3, 0x6, 0xeabb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff]}, 0x80) (rerun: 32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f0000000000)='./file1\x00', r0}, 0x10) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x35) unlink(&(0x7f0000000000)='./file0/file0\x00') mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x74}, 0x80) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x201000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc8040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/253, 0xfd}, {&(0x7f0000000180)=""/197, 0xc5}], 0x2, &(0x7f0000000280)=""/129, 0x81}, 0x40010060) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async, rerun: 64) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async, rerun: 64) unlink(&(0x7f0000004700)='./file0\x00') (async, rerun: 64) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x10, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @generic={0xe4, 0xd, 0x0, 0x4, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x37b5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @exit, @call={0x85, 0x0, 0x0, 0x3a}, @exit, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000100)='syzkaller\x00', 0x5, 0x48, &(0x7f0000000140)=""/72, 0x41100, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x3, 0x6, 0xeabb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff]}, 0x80) (rerun: 64) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f0000000000)='./file1\x00', r0}, 0x10) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x35) (async, rerun: 64) unlink(&(0x7f0000000000)='./file0/file0\x00') (async, rerun: 64) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x7a}, 0x80) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) unlink(&(0x7f0000000180)='./file0\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0xbe) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/118, 0x76}], 0x1, &(0x7f0000000180)}, 0x40) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc9000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x35) unlink(&(0x7f0000000000)='./file0/file0\x00') mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x35) (async) unlink(&(0x7f0000000000)='./file0/file0\x00') (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) (async) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) unlink(&(0x7f0000000180)='./file0\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0xbe) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/118, 0x76}], 0x1, &(0x7f0000000180)}, 0x40) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) unlink(&(0x7f0000000180)='./file0\x00') (async) mkdir(&(0x7f0000000040)='./file0\x00', 0xbe) (async) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/118, 0x76}], 0x1, &(0x7f0000000180)}, 0x40) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) (async) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc9010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xf4}, 0x80) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x500000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc9020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000100)=""/103, 0x67}, {&(0x7f0000000180)=""/187, 0xbb}, {&(0x7f0000000240)=""/77, 0x4d}, {&(0x7f00000002c0)=""/133, 0x85}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/65, 0x41}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000d277dcac66302a88fa88ce7e4a47d5000018", @ANYRES32, @ANYRES32], 0x60}, 0x40000002) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/121, 0x79}, {&(0x7f00000001c0)=""/145, 0x91}], 0x2, &(0x7f00000002c0)=""/54, 0x36}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x300}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc9030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) unlink(&(0x7f0000000180)='./file0\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0xbe) (async) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/118, 0x76}], 0x1, &(0x7f0000000180)}, 0x40) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/121, 0x79}, {&(0x7f00000001c0)=""/145, 0x91}], 0x2, &(0x7f00000002c0)=""/54, 0x36}, 0x20) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000100)=""/103, 0x67}, {&(0x7f0000000180)=""/187, 0xbb}, {&(0x7f0000000240)=""/77, 0x4d}, {&(0x7f00000002c0)=""/133, 0x85}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/65, 0x41}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000d277dcac66302a88fa88ce7e4a47d5000018", @ANYRES32, @ANYRES32], 0x60}, 0x40000002) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc9040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x399}, 0x80) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x701000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/121, 0x79}, {&(0x7f00000001c0)=""/145, 0x91}], 0x2, &(0x7f00000002c0)=""/54, 0x36}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/121, 0x79}, {&(0x7f00000001c0)=""/145, 0x91}], 0x2, &(0x7f00000002c0)=""/54, 0x36}, 0x20) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) (async) 04:06:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x24}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000100)=""/103, 0x67}, {&(0x7f0000000180)=""/187, 0xbb}, {&(0x7f0000000240)=""/77, 0x4d}, {&(0x7f00000002c0)=""/133, 0x85}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/65, 0x41}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000d277dcac66302a88fa88ce7e4a47d5000018", @ANYRES32, @ANYRES32], 0x60}, 0x40000002) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x3cc}, 0x80) 04:06:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x24}, 0x10) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x8, 0x18}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x9, &(0x7f0000000300)=ANY=[@ANYBLOB="186300000f0000000000000009000000185600000c0000000000000000000000851000000100000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000184a0000020000000000000000000000287cd000161d48a7510244fe70b17f2bfacc2333a3416d7a6994c6266c7a0acef4a14ebf67fcdcd73ba3390f53a2c4890ac9b180f3"], &(0x7f0000000100)='syzkaller\x00', 0x1d, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xa, 0x3, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r1, 0x1]}, 0x80) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f00000002c0)='./file1\x00') 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xca000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x24}, 0x10) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x500}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xca010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x1000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x8, 0x18}, 0xc) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) (rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x9, &(0x7f0000000300)=ANY=[@ANYBLOB="186300000f0000000000000009000000185600000c0000000000000000000000851000000100000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000184a0000020000000000000000000000287cd000161d48a7510244fe70b17f2bfacc2333a3416d7a6994c6266c7a0acef4a14ebf67fcdcd73ba3390f53a2c4890ac9b180f3"], &(0x7f0000000100)='syzkaller\x00', 0x1d, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xa, 0x3, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r1, 0x1]}, 0x80) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f00000002c0)='./file1\x00') 04:06:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) (async) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x600}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xca020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) (async) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x8, 0x18}, 0xc) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x9, &(0x7f0000000300)=ANY=[@ANYBLOB="186300000f0000000000000009000000185600000c0000000000000000000000851000000100000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000184a0000020000000000000000000000287cd000161d48a7510244fe70b17f2bfacc2333a3416d7a6994c6266c7a0acef4a14ebf67fcdcd73ba3390f53a2c4890ac9b180f3"], &(0x7f0000000100)='syzkaller\x00', 0x1d, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xa, 0x3, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r1, 0x1]}, 0x80) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f00000002c0)='./file1\x00') 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xca030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x141) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x700}, 0x80) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x1010000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xca040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) 04:06:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x141) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x141) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x900}, 0x80) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcb000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xa00}, 0x80) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x141) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcb010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000100)=""/237, 0xed}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/143, 0x8f}], 0x3}, 0x2041) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x2000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 3: bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) socketpair(0x2a, 0xa, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000140)=""/125, 0x7d}, {&(0x7f00000001c0)=""/19, 0x13}, {&(0x7f0000000200)=""/48, 0x30}], 0x4, &(0x7f0000000280)}, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcb020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000100)=""/237, 0xed}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/143, 0x8f}], 0x3}, 0x2041) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xb00}, 0x80) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0/file0\x00') 04:06:32 executing program 3: bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) socketpair(0x2a, 0xa, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000140)=""/125, 0x7d}, {&(0x7f00000001c0)=""/19, 0x13}, {&(0x7f0000000200)=""/48, 0x30}], 0x4, &(0x7f0000000280)}, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) socketpair(0x2a, 0xa, 0x8, &(0x7f0000000000)) (async) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000140)=""/125, 0x7d}, {&(0x7f00000001c0)=""/19, 0x13}, {&(0x7f0000000200)=""/48, 0x30}], 0x4, &(0x7f0000000280)}, 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xc00}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcb030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000100)=""/237, 0xed}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/143, 0x8f}], 0x3}, 0x2041) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) (async) recvmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000100)=""/237, 0xed}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/143, 0x8f}], 0x3}, 0x2041) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xd00}, 0x80) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x4000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcb040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async, rerun: 64) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (rerun: 64) unlink(&(0x7f0000000000)='./file0/file0\x00') 04:06:32 executing program 3: bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) socketpair(0x2a, 0xa, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000140)=""/125, 0x7d}, {&(0x7f00000001c0)=""/19, 0x13}, {&(0x7f0000000200)=""/48, 0x30}], 0x4, &(0x7f0000000280)}, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xe00}, 0x80) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x1100}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcc000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0/file0\x00') mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000000000)='./file0/file0\x00') (async) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x2, 0x6, &(0x7f0000000080)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xce, &(0x7f0000000100)=""/206, 0x41100, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0xd, 0x8000, 0x7f}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0x1]}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000000000)='./file0\x00') (async) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcc010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x5000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x2, 0x6, &(0x7f0000000080)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xce, &(0x7f0000000100)=""/206, 0x41100, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0xd, 0x8000, 0x7f}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0x1]}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x2, 0x6, &(0x7f0000000080)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xce, &(0x7f0000000100)=""/206, 0x41100, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0xd, 0x8000, 0x7f}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0x1]}, 0x80) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x1200}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcc020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0xffffffffffffff24) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x1800}, 0x80) 04:06:32 executing program 1: openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x13b) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000140), 0x2, 0x0) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x2, 0x6, &(0x7f0000000080)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xce, &(0x7f0000000100)=""/206, 0x41100, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0xd, 0x8000, 0x7f}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0x1]}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x2, 0x6, &(0x7f0000000080)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xce, &(0x7f0000000100)=""/206, 0x41100, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0xd, 0x8000, 0x7f}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0x1]}, 0x80) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcc030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0xffffffffffffff24) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x2000}, 0x80) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x7000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000040)) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)='K', 0x1}], 0x1}, 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) 04:06:32 executing program 1: openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) (async) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) (async) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x13b) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000140), 0x2, 0x0) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcc040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x2500}, 0x80) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0xffffffffffffff24) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0xffffffffffffff24) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) (async) 04:06:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000040)) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)='K', 0x1}], 0x1}, 0x0) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) 04:06:32 executing program 1: openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) (async) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x13b) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000140), 0x2, 0x0) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcd000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) 04:06:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000040)) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)='K', 0x1}], 0x1}, 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000040)) (async) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)='K', 0x1}], 0x1}, 0x0) (async) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x4100}, 0x80) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x8000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 1: mkdir(&(0x7f0000000000)='./file0/file0/file0\x00', 0x178) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcd010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x4800}, 0x80) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x2c) 04:06:32 executing program 1: mkdir(&(0x7f0000000000)='./file0/file0/file0\x00', 0x178) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcd020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 1: mkdir(&(0x7f0000000000)='./file0/file0/file0\x00', 0x178) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0/file0\x00', 0x178) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x10}, 0x10) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x4c00}, 0x80) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) (async) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcd030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x10000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x2c) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x6400}, 0x80) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file1\x00', 0x0, 0x20}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10}, 0x10) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x18c) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x86) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcd040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x2c) mkdir(&(0x7f0000003600)='./file0\x00', 0x2c) (async) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x18c) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x86) mkdir(&(0x7f0000003600)='./file0\x00', 0x18c) (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x86) (async) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x6800}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xce000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x18c) (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x86) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file1\x00', 0x0, 0x20}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file1\x00', 0x0, 0x20}, 0x10) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10}, 0x10) (async) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x11000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xce010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x6c00}, 0x80) 04:06:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x4000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file1\x00', 0x0, 0x20}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file1\x00', 0x0, 0x20}, 0x10) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10}, 0x10) (async) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xce020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x7400}, 0x80) 04:06:32 executing program 0: mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x1b) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xce030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xce040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x20000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x7a00}, 0x80) 04:06:32 executing program 0: mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x1b) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') 04:06:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x70000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcf000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x9903}, 0x80) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcf010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 0: mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x1b) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x1b) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000004700)='./file0\x00') (async) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xcc03}, 0x80) 04:06:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000340)={r2, 0xffffffffffffffff, 0xb}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r1, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}], 0x8, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="4e483cc2e85f98b111c05ad93be20b6fe7a3a7b9559ea8102a5bb771a241b1dc74ec2aee11fec5f44520eb4b0e6401e861a89ede1653430225475d7518be51cd8cb0191cc9d723a420f04f3c059bc09edddfa763e032bb17d34dd9298e3337e2b77ac65959b793208e957a4ca77f87c8385df25ac88656782ab7c14d4930c9a95daff1414c14de77d06872dfdda4ab89a0be1136f35d695f96b1512d5f2caeb5009f7b3bcc92a18ab9505cae889726cb1e9fc4194e24ca3b29ed41a2ccb1ffed5811a23ba33d8c328667c172"}, 0x20) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000340)={0x7f, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r3}, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r3}, 0x4) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcf020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x40000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) (async) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000340)={r2, 0xffffffffffffffff, 0xb}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r1, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}], 0x8, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="4e483cc2e85f98b111c05ad93be20b6fe7a3a7b9559ea8102a5bb771a241b1dc74ec2aee11fec5f44520eb4b0e6401e861a89ede1653430225475d7518be51cd8cb0191cc9d723a420f04f3c059bc09edddfa763e032bb17d34dd9298e3337e2b77ac65959b793208e957a4ca77f87c8385df25ac88656782ab7c14d4930c9a95daff1414c14de77d06872dfdda4ab89a0be1136f35d695f96b1512d5f2caeb5009f7b3bcc92a18ab9505cae889726cb1e9fc4194e24ca3b29ed41a2ccb1ffed5811a23ba33d8c328667c172"}, 0x20) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000340)={0x7f, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r3}, 0x4) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r3}, 0x4) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xf400}, 0x80) 04:06:32 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000001700)='GPL\x00', 0x4, 0xb0, &(0x7f0000000000)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0], 0x0, 0x8, &(0x7f0000000700)=[{}], 0x8, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/190, 0xbe}], 0x1, &(0x7f00000001c0)=""/188, 0xbc}, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0/file0\x00', 0x1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) 04:06:32 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcf030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:32 executing program 3: sendmsg$inet(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="c06a9e14ad576618991a7b43b99c2fe9aec326cf09addb5d103fe7e32b1ab4d8bf22dfd5fda2c210540776a6e20adbd7c4214ea5784b685ea05c0e51e807d5cd31d78024cea5ecaea4698f0a8dbfcbd709eb8fb8ca7f2538fd8c3d098215a0d09dcbb730d8495c4eff7f77048c056b852d236b4ee28a88fc4ecbe7f3cd0041", 0x7f}], 0x1, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@end, @timestamp={0x44, 0x10, 0x4a, 0x0, 0x5, [0x5, 0x6, 0x5]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x60}, 0xc000) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000200)={0x8}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f0000000740)=@nl, 0x80, &(0x7f0000001a40)=[{&(0x7f0000000400)=""/56, 0x38}, {&(0x7f00000007c0)=""/163, 0xa3}, {&(0x7f0000000880)=""/175, 0xaf}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/175, 0xaf}, {&(0x7f0000001a00)=""/5, 0x5}], 0x6, &(0x7f0000001ac0)=""/207, 0xcf}, 0x40002002) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000300)=@rc={0x1f, @fixed}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000380)=""/89, 0x59}, {&(0x7f0000000400)}, {&(0x7f0000000440)=""/41, 0x29}, {&(0x7f0000000480)=""/151, 0x97}, {&(0x7f0000000540)=""/127, 0x7f}], 0x5, &(0x7f0000000640)=""/154, 0x9a}, 0x10001) 04:06:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) (async, rerun: 64) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000340)={r2, 0xffffffffffffffff, 0xb}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r1, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}], 0x8, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) (async, rerun: 64) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="4e483cc2e85f98b111c05ad93be20b6fe7a3a7b9559ea8102a5bb771a241b1dc74ec2aee11fec5f44520eb4b0e6401e861a89ede1653430225475d7518be51cd8cb0191cc9d723a420f04f3c059bc09edddfa763e032bb17d34dd9298e3337e2b77ac65959b793208e957a4ca77f87c8385df25ac88656782ab7c14d4930c9a95daff1414c14de77d06872dfdda4ab89a0be1136f35d695f96b1512d5f2caeb5009f7b3bcc92a18ab9505cae889726cb1e9fc4194e24ca3b29ed41a2ccb1ffed5811a23ba33d8c328667c172"}, 0x20) (rerun: 64) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000340)={0x7f, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r3}, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r3}, 0x4) (async, rerun: 64) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async, rerun: 64) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 04:06:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x3c5, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xff00}, 0x80) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x30000}, 0x80) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcf040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x27d, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x4c000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd0000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8}, 0x10) unlink(&(0x7f0000000080)='./file0/file0\x00') unlink(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0/file0\x00') 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x1ac5c9}, 0x80) 04:06:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0x68000000}, 0x10}, 0x80) 04:06:33 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="49f26287b6e019fe82637656c913b0ff2a64d22cd3389be3979d50ef5662d2b71ec663c300b70e2a50434311855e93e1b0"}, 0x20) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd0010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8}, 0x10) (async) unlink(&(0x7f0000000080)='./file0/file0\x00') (async) unlink(&(0x7f0000000140)='./file0\x00') (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f0000000000)='./file0/file0\x00') 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x200000}, 0x80) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd0020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0/file0\x00') mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:33 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0/file0\x00', 0x1}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x4}, 0x10) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0xa) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x14a) 04:06:33 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x59020000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8}, 0x10) (async) unlink(&(0x7f0000000080)='./file0/file0\x00') (async) unlink(&(0x7f0000000140)='./file0\x00') (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0/file0\x00') 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x1000000}, 0x80) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd0030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x3, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x1010000}, 0x80) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd0040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f00000000c0)='./file0/file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10}, 0x10) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x2000000}, 0x80) 04:06:33 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) (async) unlink(&(0x7f00000000c0)='./file0/file0\x00') (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10}, 0x10) 04:06:33 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x71000000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x3000000}, 0x80) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd1010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x3, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f00000000c0)='./file0/file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10}, 0x10) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd1020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x4000000}, 0x80) 04:06:33 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x59020000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd1030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x5000000}, 0x80) 04:06:33 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x7d020000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd1040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x2, 0x0, 0x4, &(0x7f00000000c0)}, 0x20) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000000c0)={'veth1_macvtap\x00', @broadcast}) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x6000000}, 0x80) 04:06:33 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x11000000}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd2000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r0, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x7000000}, 0x80) 04:06:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0x6c}, 0x10}, 0x80) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd2010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x8000000}, 0x80) 04:06:33 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001c40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000400)={r2, 0x0, 0x25, 0x4}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file1\x00', 0x0, 0x4}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000095000004000000006376f6f1ea03825db3ed02b628c2b4f39fbd054e3c09653ac805261fe9d10c7d82ac5887e0420fac82e044cd110e984403a31367369467d817742b90caf3eb0fa2fca5ade11a8768d872e1adfca2774246cc801b50"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r5}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.throttle.io_serviced\x00', 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000540)={r5, r3, 0x4, r6}, 0x10) unlink(&(0x7f0000004700)='./file0\x00') recvmsg(r0, &(0x7f00000003c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f0000000300)=""/142, 0x8e}], 0x2, &(0x7f0000000180)=""/24, 0x18}, 0x0) 04:06:33 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0xc5030000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001c40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000400)={r2, 0x0, 0x25, 0x4}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file1\x00', 0x0, 0x4}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000095000004000000006376f6f1ea03825db3ed02b628c2b4f39fbd054e3c09653ac805261fe9d10c7d82ac5887e0420fac82e044cd110e984403a31367369467d817742b90caf3eb0fa2fca5ade11a8768d872e1adfca2774246cc801b50"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r5}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.throttle.io_serviced\x00', 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000540)={r5, r3, 0x4, r6}, 0x10) unlink(&(0x7f0000004700)='./file0\x00') recvmsg(r0, &(0x7f00000003c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f0000000300)=""/142, 0x8e}], 0x2, &(0x7f0000000180)=""/24, 0x18}, 0x0) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd2020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x9000000}, 0x80) 04:06:33 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x11000000}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd2030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xa000000}, 0x80) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd2040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd3000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:33 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0xcc030000, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xb000000}, 0x80) 04:06:34 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xc000000}, 0x80) 04:06:34 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x5000}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:34 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r3]}, 0x80) mkdir(&(0x7f0000001cc0)='./file0\x00', 0x1c8) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0xb, [@func={0x9, 0x0, 0x0, 0xc, 0x4}, @volatile={0x6}, @ptr={0x4, 0x0, 0x0, 0x2, 0x2}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}, @ptr={0x9}, @fwd={0x9}, @struct={0xc, 0x3, 0x0, 0x4, 0x0, 0x7, [{0xe, 0x0, 0x2}, {0xd, 0x4, 0x4}, {0x8, 0x1, 0x7f}]}]}, {0x0, [0x61, 0x5f, 0x5f, 0x30, 0x5f, 0x2e, 0x0, 0x61, 0x5f]}}, &(0x7f0000000700)=""/120, 0x9b, 0x78}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r6]}, 0x80) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000001d00)=r6, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xb, 0x1, 0x2, 0x80000000, 0x506, 0x1, 0x3ff, '\x00', 0x0, r5, 0x3, 0x4, 0x3}, 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r7, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001f80)={r7, r3}, 0xc) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r8]}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', r8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r4, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c40)={0x6, 0x6, &(0x7f0000000840)=@raw=[@generic={0x7, 0x9, 0x4, 0xe16d, 0x8}, @cb_func={0x18, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xe}], &(0x7f0000000880)='syzkaller\x00', 0x6e1a0b3a, 0x1000, &(0x7f00000008c0)=""/4096, 0x41100, 0x1e, '\x00', r9, 0x25, r5, 0x8, &(0x7f0000001bc0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0xc, &(0x7f0000000640)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xbe}, @alu={0x0, 0x0, 0xa, 0x1, 0x4, 0x100}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}], &(0x7f0000000500)='GPL\x00', 0x80, 0xa, &(0x7f00000006c0)=""/10, 0x40f00, 0x17, '\x00', r9, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x2, 0x5, 0xfff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r0, r0, r0]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, r1, 0x0, &(0x7f0000000280)=[r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e80)={0x11, 0x4, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x8000}, [@alu={0x7, 0x0, 0x0, 0x6, 0x5, 0xc, 0x1}]}, &(0x7f0000001d80)='syzkaller\x00', 0x0, 0x17, &(0x7f0000001dc0)=""/23, 0x40f00, 0x10, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e00)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000001e40)={0x0, 0x3, 0x5, 0x63f2}, 0x10}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 04:06:34 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001c40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000400)={r2, 0x0, 0x25, 0x4}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file1\x00', 0x0, 0x4}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000095000004000000006376f6f1ea03825db3ed02b628c2b4f39fbd054e3c09653ac805261fe9d10c7d82ac5887e0420fac82e044cd110e984403a31367369467d817742b90caf3eb0fa2fca5ade11a8768d872e1adfca2774246cc801b50"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r5}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.throttle.io_serviced\x00', 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000540)={r5, r3, 0x4, r6}, 0x10) unlink(&(0x7f0000004700)='./file0\x00') recvmsg(r0, &(0x7f00000003c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f0000000300)=""/142, 0x8e}], 0x2, &(0x7f0000000180)=""/24, 0x18}, 0x0) 04:06:34 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:34 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd3010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:34 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xd000000}, 0x80) 04:06:34 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd3020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:34 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xe000000}, 0x80) 04:06:34 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd3030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:34 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x10000000}, 0x80) 04:06:34 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/76, 0x4c}, {&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000200)=""/10, 0xa}, {&(0x7f0000000240)=""/141, 0x8d}], 0x5, &(0x7f0000000380)=""/127, 0x7f}, 0x10142) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0/file0\x00'}, 0x10) 04:06:34 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x11000000}, 0x80) 04:06:34 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/76, 0x4c}, {&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000200)=""/10, 0xa}, {&(0x7f0000000240)=""/141, 0x8d}], 0x5, &(0x7f0000000380)=""/127, 0x7f}, 0x10142) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0/file0\x00'}, 0x10) 04:06:34 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd3040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x259}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x300}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x2, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x12000000}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd4000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd4010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x18000000}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd4020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x20000000}, 0x80) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x3, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x25000000}, 0x80) 04:06:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x5000}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd4030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x41000000}, 0x80) 04:06:35 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x2, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x4, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0xc503}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd4040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x48000000}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd5000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x4c000000}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd5010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x1100}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x9}, 0x8) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x64000000}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd5020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd5030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x5, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x71}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x700}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x68000000}, 0x80) 04:06:35 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x3cc}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd5040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x6c000000}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd6000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x74000000}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd6010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x7, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x7a000000}, 0x80) 04:06:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x50}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x8}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd6020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x99030000}, 0x80) 04:06:35 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x1, 0x80, 0x8, 0x0, 0x2, 0x0, 0x0, 0x6, 0xa0480, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x3f, 0x8}, 0x82052, 0x8000000000000001, 0x3, 0x3, 0x4, 0x7af, 0x400, 0x0, 0x0, 0x0, 0x4}) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000080)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f00000002c0)="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", &(0x7f0000000100)=""/46}, 0x20) unlink(&(0x7f0000000000)='./file1\x00') ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000000c0)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x8, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd6030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xc9c51a00}, 0x80) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xcc030000}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd6040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8}, 0x10) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file0\x00', r0}, 0x10) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd7000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x10000000}, 0x10}, 0x80) 04:06:35 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x2}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xf4000000}, 0x80) 04:06:35 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit={0x95, 0x10}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0xff000000}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd7010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x10, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd7020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x2}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd7030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd7040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 3: mkdir(&(0x7f0000000000)='./file1\x00', 0x94) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x1c}, 0x10) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x11, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf3, 0x0, 0x0, 0x0, 0x800}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x6ab}]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0xe9, &(0x7f0000000100)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0xb, [@func={0x9, 0x0, 0x0, 0xc, 0x4}, @volatile={0x6}, @ptr={0x4, 0x0, 0x0, 0x2, 0x2}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}, @ptr={0x9}, @fwd={0x9}, @struct={0xc, 0x3, 0x0, 0x4, 0x0, 0x7, [{0xe, 0x0, 0x2}, {0xd, 0x4, 0x4}, {0x8, 0x1, 0x7f}]}]}, {0x0, [0x61, 0x5f, 0x5f, 0x30, 0x5f, 0x2e, 0x0, 0x61, 0x5f]}}, &(0x7f0000000700)=""/120, 0x9b, 0x78}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xb, 0x1, 0x2, 0x80000000, 0x506, 0x1, 0x3ff, '\x00', 0x0, r1, 0x3, 0x4, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r0, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c40)={0x6, 0x6, &(0x7f0000000840)=@raw=[@generic={0x7, 0x9, 0x4, 0xe16d, 0x8}, @cb_func={0x18, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xe}], &(0x7f0000000880)='syzkaller\x00', 0x6e1a0b3a, 0x1000, &(0x7f00000008c0)=""/4096, 0x41100, 0x1e, '\x00', r2, 0x25, r1, 0x8, &(0x7f0000001bc0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x6, 0x0, 0x3ff, 0x20, 0xffffffffffffffff, 0x8, '\x00', 0x0, r1, 0x0, 0x5, 0x4, 0xf}, 0x48) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x3}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd8000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x1b, 0x9}, 0x14) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x10) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x4}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd8010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2c503, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) unlink(&(0x7f0000000080)='./file0\x00') unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd8020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x11, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x5}, 0x80) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x4c, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0/file0\x00', 0x0) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd8030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x6}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd8040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x7}, 0x80) 04:06:35 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x89) 04:06:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20700, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd9000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x8}, 0x80) 04:06:35 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x40) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:06:35 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000380)='./file0/file0\x00', r0}, 0x10) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x50, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd9010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x5c18000000000000) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x9}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd9020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2004c, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xa}, 0x80) 04:06:35 executing program 1: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0xf4ffffff00000000) 04:06:35 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0xd00000000000000) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd9030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xb}, 0x80) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x71, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2004c, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd9040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xc}, 0x80) 04:06:35 executing program 3: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x700000000000000) 04:06:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20010, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xd}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xda000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20007, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x259, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xda010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xe}, 0x80) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xda020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:35 executing program 0: mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000380)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/182, 0xb6}, {&(0x7f00000004c0)=""/96, 0x60}, {&(0x7f0000000680)=""/214, 0xd6}], 0x3, &(0x7f00000005c0)=""/94, 0x5e}, 0x40000063) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000640)=ANY=[@ANYBLOB="ad5ec597c041e1bb000000000c0000000c00000002000000090000000000000c000000000000"], 0x0, 0x26}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r1, 0x0, 0x0) r2 = syz_clone(0x400, &(0x7f0000000800)="08dd8207d22f05a72f7126c3e66e37f79658797c6f0cef6efe0802d51667b692bc5e17e963a58fa0a5ddf792e883ae40fdb7e9dcc700318df6de71c191e71f4fc23aa23f765bac8a90deed1942fdfacc2ac4b1e5edc111dfdb9c3a8cc82af18a822f975840bc6b413ff5686cba39dc86b455b0922ca8c193097d394440a8efcb79ccee80dad2a140e05e78419709b2660bf288", 0x93, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="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") syz_open_procfs$namespace(r2, &(0x7f0000001940)='ns/mnt\x00') recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f0000000100)=[{&(0x7f0000000000)=""/56, 0x38}], 0x1, &(0x7f0000000140)=""/200, 0xc8}, 0x20) unlink(&(0x7f0000000280)='./file0\x00') 04:06:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x10}, 0x80) 04:06:36 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xda030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:36 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x27d, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:36 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffffffffffff, 0x3, 0x10}, 0xc) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={@map=r0, r1, 0x5, 0x4, r2}, 0x14) mkdir(&(0x7f0000003600)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000004700)='./file0\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r3, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000580)='./file0\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x39, 0x2, &(0x7f0000000200)=@raw=[@ldst={0x3, 0x7, 0x0, 0xb, 0xb, 0x0, 0xfffffffffffffffc}, @ldst={0x0, 0x1, 0x1, 0x8, 0x7, 0x30, 0xfffffffffffffff8}], &(0x7f0000000240)='GPL\x00', 0x1f, 0x60, &(0x7f0000000280)=""/96, 0x40f00, 0x19, '\x00', 0x0, 0x1c, r4, 0x8, &(0x7f0000000500)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0xf2, 0x400, 0xbe41b46a}, 0x10, 0xffffffffffffffff}, 0x80) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x14) 04:06:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x11}, 0x80) 04:06:36 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xda040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:36 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20005, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:36 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x300, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x12}, 0x80) 04:06:36 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdb000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:36 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdb010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:36 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (fail_nth: 1) 04:06:36 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x27d, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:36 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20005, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:36 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x3c5, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x18}, 0x80) 04:06:36 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdb020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x25}, 0x80) 04:06:36 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdb030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x41}, 0x80) 04:06:36 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdb040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:36 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x3cc, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:36 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 04:06:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x48}, 0x80) [ 2556.621311][T11670] FAULT_INJECTION: forcing a failure. [ 2556.621311][T11670] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2556.663682][T11679] FAULT_INJECTION: forcing a failure. [ 2556.663682][T11679] name failslab, interval 1, probability 0, space 0, times 0 [ 2556.684286][T11670] CPU: 0 PID: 11670 Comm: syz-executor.0 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2556.694358][T11670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2556.704342][T11670] Call Trace: [ 2556.707460][T11670] [ 2556.710237][T11670] dump_stack_lvl+0x151/0x1b7 [ 2556.714856][T11670] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2556.720135][T11670] dump_stack+0x15/0x17 [ 2556.724126][T11670] should_fail+0x3c0/0x510 [ 2556.728379][T11670] should_fail_usercopy+0x1a/0x20 [ 2556.733330][T11670] _copy_from_user+0x20/0xd0 [ 2556.737887][T11670] __sys_bpf+0x1f6/0x750 [ 2556.741960][T11670] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2556.747162][T11670] ? debug_smp_processor_id+0x17/0x20 [ 2556.752547][T11670] __x64_sys_bpf+0x7c/0x90 [ 2556.756798][T11670] do_syscall_64+0x44/0xd0 [ 2556.761052][T11670] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2556.766857][T11670] RIP: 0033:0x7f5a864400d9 [ 2556.771110][T11670] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2556.790568][T11670] RSP: 002b:00007f5a851b3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2556.798896][T11670] RAX: ffffffffffffffda RBX: 00007f5a8655ff80 RCX: 00007f5a864400d9 [ 2556.806931][T11670] RDX: 0000000000000080 RSI: 0000000020003680 RDI: 0000000000000005 [ 2556.814737][T11670] RBP: 00007f5a851b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2556.822547][T11670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2556.830357][T11670] R13: 00007ffcfda9195f R14: 00007f5a851b3300 R15: 0000000000022000 [ 2556.838406][T11670] [ 2556.841281][T11679] CPU: 1 PID: 11679 Comm: syz-executor.1 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2556.851342][T11679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2556.861336][T11679] Call Trace: [ 2556.864459][T11679] [ 2556.867237][T11679] dump_stack_lvl+0x151/0x1b7 [ 2556.871748][T11679] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2556.877042][T11679] ? do_handle_mm_fault+0x142f/0x2370 [ 2556.882263][T11679] dump_stack+0x15/0x17 [ 2556.886242][T11679] should_fail+0x3c0/0x510 [ 2556.890494][T11679] __should_failslab+0x9f/0xe0 [ 2556.895094][T11679] should_failslab+0x9/0x20 [ 2556.899454][T11679] kmem_cache_alloc+0x4f/0x2f0 [ 2556.904033][T11679] ? dup_task_struct+0x53/0xa60 [ 2556.908722][T11679] ? __kasan_check_write+0x14/0x20 [ 2556.913672][T11679] dup_task_struct+0x53/0xa60 [ 2556.918184][T11679] ? __kasan_check_write+0x14/0x20 [ 2556.923126][T11679] copy_process+0x579/0x3250 [ 2556.927663][T11679] ? __kasan_check_write+0x14/0x20 [ 2556.932594][T11679] ? proc_fail_nth_write+0x213/0x290 [ 2556.937718][T11679] ? proc_fail_nth_read+0x220/0x220 [ 2556.942841][T11679] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2556.947864][T11679] ? vfs_write+0x9af/0x1050 [ 2556.952204][T11679] ? vmacache_update+0xb7/0x120 [ 2556.956890][T11679] kernel_clone+0x22d/0x990 [ 2556.961243][T11679] ? file_end_write+0x1b0/0x1b0 [ 2556.965919][T11679] ? __kasan_check_write+0x14/0x20 [ 2556.970863][T11679] ? create_io_thread+0x1e0/0x1e0 [ 2556.975727][T11679] ? __mutex_lock_slowpath+0x10/0x10 [ 2556.980978][T11679] __x64_sys_clone+0x289/0x310 [ 2556.985744][T11679] ? __do_sys_vfork+0x130/0x130 [ 2556.990418][T11679] ? debug_smp_processor_id+0x17/0x20 [ 2556.995634][T11679] do_syscall_64+0x44/0xd0 [ 2556.999981][T11679] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2557.005701][T11679] RIP: 0033:0x7fe2c05720d9 [ 2557.010481][T11679] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2557.030475][T11679] RSP: 002b:00007fe2bf2e5118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2557.039222][T11679] RAX: ffffffffffffffda RBX: 00007fe2c0691f80 RCX: 00007fe2c05720d9 [ 2557.047218][T11679] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2557.055116][T11679] RBP: 00007fe2bf2e51d0 R08: 0000000000000000 R09: 0000000000000000 04:06:37 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (fail_nth: 2) 04:06:37 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 04:06:37 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:37 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x4c}, 0x80) 04:06:37 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x500, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:37 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) [ 2557.062912][T11679] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2557.070724][T11679] R13: 00007ffd50d6cdff R14: 00007fe2bf2e5300 R15: 0000000000022000 [ 2557.078711][T11679] [ 2557.093706][T11684] FAULT_INJECTION: forcing a failure. [ 2557.093706][T11684] name failslab, interval 1, probability 0, space 0, times 0 [ 2557.104573][T11691] FAULT_INJECTION: forcing a failure. [ 2557.104573][T11691] name failslab, interval 1, probability 0, space 0, times 0 [ 2557.111836][T11684] CPU: 0 PID: 11684 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2557.128606][T11684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2557.138499][T11684] Call Trace: [ 2557.141627][T11684] [ 2557.144397][T11684] dump_stack_lvl+0x151/0x1b7 [ 2557.148910][T11684] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2557.154296][T11684] ? do_handle_mm_fault+0x142f/0x2370 [ 2557.159500][T11684] dump_stack+0x15/0x17 [ 2557.163837][T11684] should_fail+0x3c0/0x510 [ 2557.168097][T11684] __should_failslab+0x9f/0xe0 [ 2557.172787][T11684] should_failslab+0x9/0x20 [ 2557.177129][T11684] kmem_cache_alloc+0x4f/0x2f0 [ 2557.181719][T11684] ? dup_task_struct+0x53/0xa60 [ 2557.186405][T11684] ? __kasan_check_write+0x14/0x20 [ 2557.191357][T11684] dup_task_struct+0x53/0xa60 [ 2557.195865][T11684] ? __kasan_check_write+0x14/0x20 [ 2557.200812][T11684] copy_process+0x579/0x3250 [ 2557.205247][T11684] ? __kasan_check_write+0x14/0x20 [ 2557.210192][T11684] ? proc_fail_nth_write+0x213/0x290 [ 2557.215327][T11684] ? proc_fail_nth_read+0x220/0x220 [ 2557.220582][T11684] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2557.225523][T11684] ? vfs_write+0x9af/0x1050 [ 2557.229855][T11684] ? vmacache_update+0xb7/0x120 [ 2557.234552][T11684] kernel_clone+0x22d/0x990 [ 2557.238887][T11684] ? file_end_write+0x1b0/0x1b0 [ 2557.243575][T11684] ? __kasan_check_write+0x14/0x20 [ 2557.248522][T11684] ? create_io_thread+0x1e0/0x1e0 [ 2557.253377][T11684] ? __mutex_lock_slowpath+0x10/0x10 [ 2557.258502][T11684] __x64_sys_clone+0x289/0x310 [ 2557.263108][T11684] ? __do_sys_vfork+0x130/0x130 [ 2557.267786][T11684] ? debug_smp_processor_id+0x17/0x20 [ 2557.273013][T11684] do_syscall_64+0x44/0xd0 [ 2557.277247][T11684] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2557.282972][T11684] RIP: 0033:0x7fd2e6d030d9 [ 2557.287229][T11684] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2557.306795][T11684] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2557.315039][T11684] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2557.322849][T11684] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2557.330660][T11684] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2557.338729][T11684] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2557.346539][T11684] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2557.354366][T11684] [ 2557.357215][T11691] CPU: 1 PID: 11691 Comm: syz-executor.1 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2557.367287][T11691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2557.377179][T11691] Call Trace: [ 2557.380303][T11691] [ 2557.382404][T11692] FAULT_INJECTION: forcing a failure. [ 2557.382404][T11692] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2557.383076][T11691] dump_stack_lvl+0x151/0x1b7 [ 2557.400670][T11691] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2557.405959][T11691] ? __kasan_slab_alloc+0xc4/0xe0 [ 2557.410813][T11691] ? kmem_cache_alloc+0x189/0x2f0 [ 2557.415670][T11691] dump_stack+0x15/0x17 [ 2557.419674][T11691] should_fail+0x3c0/0x510 [ 2557.423927][T11691] ? __get_vm_area_node+0x13a/0x380 [ 2557.428949][T11691] __should_failslab+0x9f/0xe0 [ 2557.433550][T11691] should_failslab+0x9/0x20 [ 2557.437895][T11691] kmem_cache_alloc_trace+0x4a/0x310 [ 2557.443010][T11691] __get_vm_area_node+0x13a/0x380 [ 2557.447870][T11691] __vmalloc_node_range+0xda/0x800 [ 2557.452814][T11691] ? copy_process+0x579/0x3250 [ 2557.457417][T11691] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2557.462369][T11691] ? dup_task_struct+0x53/0xa60 [ 2557.467050][T11691] dup_task_struct+0x61f/0xa60 [ 2557.471656][T11691] ? copy_process+0x579/0x3250 [ 2557.476258][T11691] ? __kasan_check_write+0x14/0x20 [ 2557.481206][T11691] copy_process+0x579/0x3250 [ 2557.485623][T11691] ? __kasan_check_write+0x14/0x20 [ 2557.490675][T11691] ? proc_fail_nth_write+0x213/0x290 [ 2557.495791][T11691] ? proc_fail_nth_read+0x220/0x220 [ 2557.500812][T11691] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2557.505761][T11691] ? vfs_write+0x9af/0x1050 [ 2557.510794][T11691] ? vmacache_update+0xb7/0x120 04:06:37 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x64}, 0x80) 04:06:37 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2557.515484][T11691] kernel_clone+0x22d/0x990 [ 2557.519827][T11691] ? file_end_write+0x1b0/0x1b0 [ 2557.524508][T11691] ? __kasan_check_write+0x14/0x20 [ 2557.529452][T11691] ? create_io_thread+0x1e0/0x1e0 [ 2557.534405][T11691] ? __mutex_lock_slowpath+0x10/0x10 [ 2557.539521][T11691] __x64_sys_clone+0x289/0x310 [ 2557.544126][T11691] ? __do_sys_vfork+0x130/0x130 [ 2557.548808][T11691] ? debug_smp_processor_id+0x17/0x20 [ 2557.554478][T11691] do_syscall_64+0x44/0xd0 [ 2557.558710][T11691] entry_SYSCALL_64_after_hwframe+0x61/0xcb 04:06:37 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x68}, 0x80) [ 2557.564783][T11691] RIP: 0033:0x7fe2c05720d9 [ 2557.569032][T11691] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2557.588578][T11691] RSP: 002b:00007fe2bf2e5118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2557.596821][T11691] RAX: ffffffffffffffda RBX: 00007fe2c0691f80 RCX: 00007fe2c05720d9 [ 2557.604636][T11691] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 04:06:37 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x6c}, 0x80) 04:06:37 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x74}, 0x80) [ 2557.612447][T11691] RBP: 00007fe2bf2e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2557.620256][T11691] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2557.628068][T11691] R13: 00007ffd50d6cdff R14: 00007fe2bf2e5300 R15: 0000000000022000 [ 2557.635883][T11691] [ 2557.639894][T11692] CPU: 0 PID: 11692 Comm: syz-executor.0 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2557.649961][T11692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2557.659852][T11692] Call Trace: [ 2557.662982][T11692] [ 2557.665755][T11692] dump_stack_lvl+0x151/0x1b7 [ 2557.670274][T11692] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2557.675562][T11692] ? kstrtouint_from_user+0x215/0x2b0 [ 2557.680768][T11692] ? kstrtol_from_user+0x310/0x310 [ 2557.685713][T11692] dump_stack+0x15/0x17 [ 2557.689707][T11692] should_fail+0x3c0/0x510 [ 2557.693960][T11692] should_fail_usercopy+0x1a/0x20 [ 2557.698820][T11692] strncpy_from_user+0x24/0x2b0 [ 2557.703679][T11692] bpf_prog_load+0x1f5/0x1b60 [ 2557.708195][T11692] ? map_freeze+0x360/0x360 [ 2557.712540][T11692] ? selinux_bpf+0xcb/0x100 [ 2557.716872][T11692] ? security_bpf+0xb0/0xd0 [ 2557.721215][T11692] __sys_bpf+0x4c2/0x750 [ 2557.725293][T11692] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2557.730510][T11692] ? debug_smp_processor_id+0x17/0x20 [ 2557.735799][T11692] __x64_sys_bpf+0x7c/0x90 [ 2557.740057][T11692] do_syscall_64+0x44/0xd0 [ 2557.744300][T11692] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2557.750034][T11692] RIP: 0033:0x7f5a864400d9 [ 2557.754284][T11692] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2557.773808][T11692] RSP: 002b:00007f5a851b3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2557.782053][T11692] RAX: ffffffffffffffda RBX: 00007f5a8655ff80 RCX: 00007f5a864400d9 [ 2557.789862][T11692] RDX: 0000000000000080 RSI: 0000000020003680 RDI: 0000000000000005 [ 2557.797684][T11692] RBP: 00007f5a851b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2557.805487][T11692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 04:06:38 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (fail_nth: 3) 04:06:38 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x700, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:38 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) 04:06:38 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2557.813300][T11692] R13: 00007ffcfda9195f R14: 00007f5a851b3300 R15: 0000000000022000 [ 2557.821111][T11692] [ 2557.828807][T11691] warn_alloc: 12 callbacks suppressed [ 2557.828824][T11691] syz-executor.1: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 2557.839271][T11705] FAULT_INJECTION: forcing a failure. [ 2557.839271][T11705] name failslab, interval 1, probability 0, space 0, times 0 [ 2557.853441][T11691] ,cpuset= 04:06:38 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:38 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2557.864717][T11705] CPU: 1 PID: 11705 Comm: syz-executor.0 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2557.877636][T11705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2557.883511][T11691] syz1 [ 2557.887525][T11705] Call Trace: [ 2557.890361][T11691] ,mems_allowed=0 [ 2557.893254][T11705] [ 2557.893264][T11705] dump_stack_lvl+0x151/0x1b7 [ 2557.902546][T11691] [ 2557.904406][T11705] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2557.911882][T11705] ? avc_has_perm_noaudit+0x358/0x450 [ 2557.917083][T11705] ? avc_has_perm_noaudit+0x358/0x450 [ 2557.922289][T11705] ? memcpy+0x56/0x70 [ 2557.926115][T11705] dump_stack+0x15/0x17 [ 2557.930098][T11705] should_fail+0x3c0/0x510 [ 2557.934357][T11705] ? __get_vm_area_node+0x13a/0x380 [ 2557.938999][T11710] FAULT_INJECTION: forcing a failure. [ 2557.938999][T11710] name failslab, interval 1, probability 0, space 0, times 0 [ 2557.939381][T11705] __should_failslab+0x9f/0xe0 [ 2557.939406][T11705] should_failslab+0x9/0x20 [ 2557.960834][T11705] kmem_cache_alloc_trace+0x4a/0x310 [ 2557.965946][T11705] __get_vm_area_node+0x13a/0x380 [ 2557.970803][T11705] __vmalloc_node_range+0xda/0x800 [ 2557.975752][T11705] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2557.981132][T11705] ? kstrtouint_from_user+0x215/0x2b0 [ 2557.986337][T11705] ? kstrtol_from_user+0x310/0x310 [ 2557.991287][T11705] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2557.996665][T11705] __vmalloc+0x7a/0x90 [ 2558.000571][T11705] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2558.005952][T11705] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2558.011166][T11705] ? bpf_prog_alloc+0x15/0x1f0 [ 2558.015759][T11705] bpf_prog_alloc+0x1f/0x1f0 [ 2558.020198][T11705] bpf_prog_load+0x835/0x1b60 [ 2558.024701][T11705] ? map_freeze+0x360/0x360 [ 2558.029041][T11705] ? selinux_bpf+0xcb/0x100 [ 2558.033379][T11705] ? security_bpf+0xb0/0xd0 [ 2558.037715][T11705] __sys_bpf+0x4c2/0x750 [ 2558.041805][T11705] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2558.047093][T11705] ? debug_smp_processor_id+0x17/0x20 [ 2558.052296][T11705] __x64_sys_bpf+0x7c/0x90 [ 2558.056551][T11705] do_syscall_64+0x44/0xd0 [ 2558.060808][T11705] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2558.066530][T11705] RIP: 0033:0x7f5a864400d9 [ 2558.070784][T11705] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2558.090227][T11705] RSP: 002b:00007f5a851b3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2558.098468][T11705] RAX: ffffffffffffffda RBX: 00007f5a8655ff80 RCX: 00007f5a864400d9 [ 2558.106287][T11705] RDX: 0000000000000080 RSI: 0000000020003680 RDI: 0000000000000005 [ 2558.114091][T11705] RBP: 00007f5a851b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2558.121912][T11705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2558.129891][T11705] R13: 00007ffcfda9195f R14: 00007f5a851b3300 R15: 0000000000022000 [ 2558.138224][T11705] [ 2558.143199][T11710] CPU: 0 PID: 11710 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2558.153271][T11710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2558.163164][T11710] Call Trace: [ 2558.166287][T11710] [ 2558.169063][T11710] dump_stack_lvl+0x151/0x1b7 [ 2558.173773][T11710] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2558.178958][T11710] ? __this_cpu_preempt_check+0x13/0x20 [ 2558.184340][T11710] dump_stack+0x15/0x17 [ 2558.188329][T11710] should_fail+0x3c0/0x510 [ 2558.192582][T11710] __should_failslab+0x9f/0xe0 [ 2558.197192][T11710] should_failslab+0x9/0x20 [ 2558.201524][T11710] kmem_cache_alloc+0x4f/0x2f0 [ 2558.206122][T11710] ? __kasan_check_write+0x14/0x20 [ 2558.211069][T11710] ? prepare_creds+0x30/0x690 [ 2558.215626][T11710] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 2558.220876][T11710] prepare_creds+0x30/0x690 [ 2558.225215][T11710] copy_creds+0xde/0x640 [ 2558.229295][T11710] copy_process+0x775/0x3250 [ 2558.233721][T11710] ? __kasan_check_write+0x14/0x20 [ 2558.238782][T11710] ? proc_fail_nth_write+0x213/0x290 [ 2558.243877][T11710] ? proc_fail_nth_read+0x220/0x220 [ 2558.248914][T11710] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2558.253859][T11710] ? vfs_write+0x9af/0x1050 [ 2558.258196][T11710] ? vmacache_update+0xb7/0x120 [ 2558.262898][T11710] kernel_clone+0x22d/0x990 [ 2558.267223][T11710] ? file_end_write+0x1b0/0x1b0 [ 2558.271925][T11710] ? __kasan_check_write+0x14/0x20 [ 2558.276855][T11710] ? create_io_thread+0x1e0/0x1e0 [ 2558.281722][T11710] ? __mutex_lock_slowpath+0x10/0x10 [ 2558.286841][T11710] __x64_sys_clone+0x289/0x310 [ 2558.291525][T11710] ? __do_sys_vfork+0x130/0x130 [ 2558.296222][T11710] ? debug_smp_processor_id+0x17/0x20 [ 2558.301421][T11710] do_syscall_64+0x44/0xd0 [ 2558.305674][T11710] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2558.311400][T11710] RIP: 0033:0x7fd2e6d030d9 [ 2558.315655][T11710] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2558.335093][T11710] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2558.343338][T11710] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2558.351149][T11710] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2558.358972][T11710] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2558.366772][T11710] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2558.374583][T11710] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2558.382397][T11710] [ 2558.385261][T11691] CPU: 1 PID: 11691 Comm: syz-executor.1 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2558.395338][T11691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2558.405223][T11691] Call Trace: [ 2558.408347][T11691] [ 2558.411163][T11691] dump_stack_lvl+0x151/0x1b7 [ 2558.415641][T11691] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2558.421470][T11691] ? __rcu_read_unlock+0x7c/0xd0 [ 2558.426241][T11691] dump_stack+0x15/0x17 [ 2558.430232][T11691] warn_alloc+0x242/0x3d0 [ 2558.434410][T11691] ? zone_watermark_ok_safe+0x280/0x280 [ 2558.439939][T11691] ? __get_vm_area_node+0x36a/0x380 [ 2558.444947][T11691] __vmalloc_node_range+0x2be/0x800 [ 2558.449979][T11691] ? dup_task_struct+0x53/0xa60 [ 2558.454674][T11691] dup_task_struct+0x61f/0xa60 [ 2558.459266][T11691] ? copy_process+0x579/0x3250 [ 2558.463874][T11691] ? __kasan_check_write+0x14/0x20 [ 2558.468813][T11691] copy_process+0x579/0x3250 [ 2558.473239][T11691] ? __kasan_check_write+0x14/0x20 [ 2558.478186][T11691] ? proc_fail_nth_write+0x213/0x290 [ 2558.483306][T11691] ? proc_fail_nth_read+0x220/0x220 [ 2558.488340][T11691] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2558.493287][T11691] ? vfs_write+0x9af/0x1050 [ 2558.497627][T11691] ? vmacache_update+0xb7/0x120 [ 2558.502318][T11691] kernel_clone+0x22d/0x990 [ 2558.506653][T11691] ? file_end_write+0x1b0/0x1b0 [ 2558.511341][T11691] ? __kasan_check_write+0x14/0x20 [ 2558.516291][T11691] ? create_io_thread+0x1e0/0x1e0 [ 2558.521147][T11691] ? __mutex_lock_slowpath+0x10/0x10 [ 2558.526283][T11691] __x64_sys_clone+0x289/0x310 [ 2558.530868][T11691] ? __do_sys_vfork+0x130/0x130 [ 2558.535557][T11691] ? debug_smp_processor_id+0x17/0x20 [ 2558.540767][T11691] do_syscall_64+0x44/0xd0 [ 2558.545023][T11691] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2558.550750][T11691] RIP: 0033:0x7fe2c05720d9 [ 2558.554998][T11691] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2558.574437][T11691] RSP: 002b:00007fe2bf2e5118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2558.582684][T11691] RAX: ffffffffffffffda RBX: 00007fe2c0691f80 RCX: 00007fe2c05720d9 [ 2558.590495][T11691] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2558.598304][T11691] RBP: 00007fe2bf2e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2558.606117][T11691] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2558.613928][T11691] R13: 00007ffd50d6cdff R14: 00007fe2bf2e5300 R15: 0000000000022000 [ 2558.621745][T11691] [ 2558.624917][T11691] Mem-Info: [ 2558.627894][T11691] active_anon:15455 inactive_anon:13163 isolated_anon:0 [ 2558.627894][T11691] active_file:7409 inactive_file:9031 isolated_file:0 [ 2558.627894][T11691] unevictable:0 dirty:35 writeback:0 [ 2558.627894][T11691] slab_reclaimable:26235 slab_unreclaimable:74814 [ 2558.627894][T11691] mapped:28686 shmem:15514 pagetables:505 bounce:0 [ 2558.627894][T11691] kernel_misc_reclaimable:0 [ 2558.627894][T11691] free:1519609 free_pcp:25937 free_cma:0 [ 2558.669419][T11691] Node 0 active_anon:61820kB inactive_anon:52652kB active_file:29636kB inactive_file:36124kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:114744kB dirty:140kB writeback:0kB shmem:62056kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4216kB pagetables:2020kB all_unreclaimable? no [ 2558.700316][T11691] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982428kB mlocked:0kB bounce:0kB free_pcp:5704kB local_pcp:56kB free_cma:0kB [ 2558.727589][T11691] lowmem_reserve[]: 0 3941 3941 [ 2558.732549][T11691] Normal free:3101712kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:61820kB inactive_anon:52636kB active_file:29636kB inactive_file:36124kB unevictable:0kB writepending:140kB present:5242880kB managed:4035848kB mlocked:0kB bounce:0kB free_pcp:98032kB local_pcp:46092kB free_cma:0kB [ 2558.761789][T11691] lowmem_reserve[]: 0 0 0 [ 2558.765947][T11691] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB [ 2558.781306][T11691] Normal: 12670*4kB (UME) 6309*8kB (UME) 5257*16kB (UME) 2759*32kB (UME) 3010*64kB (UME) 1748*128kB (UME) 881*256kB (UME) 338*512kB (UME) 84*1024kB (UM) 9*2048kB (UME) 466*4096kB (M) = 3101712kB [ 2558.800433][T11691] 31954 total pagecache pages [ 2558.804907][T11691] 0 pages in swap cache [ 2558.808968][T11691] Swap cache stats: add 0, delete 0, find 0/0 [ 2558.814840][T11691] Free swap = 0kB [ 2558.818380][T11691] Total swap = 0kB 04:06:39 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:06:39 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdd000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:39 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x7a}, 0x80) 04:06:39 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (fail_nth: 4) 04:06:39 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x1100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:39 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) 04:06:39 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdd010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2558.821991][T11691] 2097051 pages RAM [ 2558.825593][T11691] 0 pages HighMem/MovableOnly [ 2558.830119][T11691] 342482 pages reserved [ 2558.834098][T11691] 0 pages cma reserved [ 2558.844244][T11721] FAULT_INJECTION: forcing a failure. [ 2558.844244][T11721] name failslab, interval 1, probability 0, space 0, times 0 [ 2558.858830][T11726] FAULT_INJECTION: forcing a failure. [ 2558.858830][T11726] name failslab, interval 1, probability 0, space 0, times 0 [ 2558.868244][T11721] CPU: 0 PID: 11721 Comm: syz-executor.0 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2558.882065][T11721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2558.891955][T11721] Call Trace: [ 2558.895079][T11721] [ 2558.897888][T11721] dump_stack_lvl+0x151/0x1b7 [ 2558.902368][T11721] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2558.907661][T11721] ? __get_vm_area_node+0x13a/0x380 [ 2558.912719][T11721] ? ____kasan_kmalloc+0xee/0x110 [ 2558.917564][T11721] ? ____kasan_kmalloc+0xdc/0x110 [ 2558.922415][T11721] dump_stack+0x15/0x17 [ 2558.926497][T11721] should_fail+0x3c0/0x510 [ 2558.930745][T11721] __should_failslab+0x9f/0xe0 [ 2558.935345][T11721] should_failslab+0x9/0x20 [ 2558.939736][T11721] kmem_cache_alloc+0x4f/0x2f0 [ 2558.944285][T11721] ? alloc_vmap_area+0x19a/0x1a90 [ 2558.949150][T11721] alloc_vmap_area+0x19a/0x1a90 [ 2558.953833][T11721] ? vm_map_ram+0xa80/0xa80 [ 2558.958170][T11721] ? __kasan_kmalloc+0x9/0x10 [ 2558.962687][T11721] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2558.968066][T11721] ? __get_vm_area_node+0x13a/0x380 [ 2558.973117][T11721] __get_vm_area_node+0x17b/0x380 [ 2558.977963][T11721] __vmalloc_node_range+0xda/0x800 [ 2558.983004][T11721] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2558.988378][T11721] ? kstrtouint_from_user+0x215/0x2b0 [ 2558.993587][T11721] ? kstrtol_from_user+0x310/0x310 [ 2558.998531][T11721] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2559.003909][T11721] __vmalloc+0x7a/0x90 [ 2559.007903][T11721] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2559.013287][T11721] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2559.018492][T11721] ? bpf_prog_alloc+0x15/0x1f0 [ 2559.023092][T11721] bpf_prog_alloc+0x1f/0x1f0 [ 2559.027525][T11721] bpf_prog_load+0x835/0x1b60 [ 2559.032035][T11721] ? map_freeze+0x360/0x360 [ 2559.036373][T11721] ? selinux_bpf+0xcb/0x100 [ 2559.040716][T11721] ? security_bpf+0xb0/0xd0 [ 2559.045051][T11721] __sys_bpf+0x4c2/0x750 [ 2559.049129][T11721] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2559.054338][T11721] ? debug_smp_processor_id+0x17/0x20 [ 2559.059549][T11721] __x64_sys_bpf+0x7c/0x90 [ 2559.063801][T11721] do_syscall_64+0x44/0xd0 [ 2559.068051][T11721] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2559.073777][T11721] RIP: 0033:0x7f5a864400d9 [ 2559.078032][T11721] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2559.097473][T11721] RSP: 002b:00007f5a851b3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2559.105725][T11721] RAX: ffffffffffffffda RBX: 00007f5a8655ff80 RCX: 00007f5a864400d9 [ 2559.113541][T11721] RDX: 0000000000000080 RSI: 0000000020003680 RDI: 0000000000000005 [ 2559.121342][T11721] RBP: 00007f5a851b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2559.129155][T11721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2559.136970][T11721] R13: 00007ffcfda9195f R14: 00007f5a851b3300 R15: 0000000000022000 [ 2559.144779][T11721] [ 2559.147640][T11726] CPU: 1 PID: 11726 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2559.157711][T11726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2559.167622][T11726] Call Trace: [ 2559.170724][T11726] [ 2559.173502][T11726] dump_stack_lvl+0x151/0x1b7 [ 2559.178018][T11726] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2559.183307][T11726] ? __get_vm_area_node+0x13a/0x380 [ 2559.188342][T11726] ? ____kasan_kmalloc+0xee/0x110 [ 2559.193202][T11726] ? ____kasan_kmalloc+0xdc/0x110 [ 2559.198066][T11726] dump_stack+0x15/0x17 [ 2559.202056][T11726] should_fail+0x3c0/0x510 [ 2559.206310][T11726] __should_failslab+0x9f/0xe0 [ 2559.210910][T11726] should_failslab+0x9/0x20 [ 2559.215247][T11726] kmem_cache_alloc+0x4f/0x2f0 [ 2559.219846][T11726] ? alloc_vmap_area+0x19a/0x1a90 [ 2559.224706][T11726] alloc_vmap_area+0x19a/0x1a90 [ 2559.229395][T11726] ? vm_map_ram+0xa80/0xa80 [ 2559.233734][T11726] ? __kasan_kmalloc+0x9/0x10 [ 2559.238246][T11726] ? __get_vm_area_node+0x13a/0x380 [ 2559.243283][T11726] __get_vm_area_node+0x17b/0x380 [ 2559.248227][T11726] __vmalloc_node_range+0xda/0x800 [ 2559.253174][T11726] ? copy_process+0x579/0x3250 [ 2559.257792][T11726] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2559.262634][T11726] ? dup_task_struct+0x53/0xa60 [ 2559.267323][T11726] dup_task_struct+0x61f/0xa60 [ 2559.271931][T11726] ? copy_process+0x579/0x3250 [ 2559.276521][T11726] ? __kasan_check_write+0x14/0x20 [ 2559.281469][T11726] copy_process+0x579/0x3250 [ 2559.285896][T11726] ? __kasan_check_write+0x14/0x20 [ 2559.290842][T11726] ? proc_fail_nth_write+0x213/0x290 [ 2559.295966][T11726] ? proc_fail_nth_read+0x220/0x220 [ 2559.301019][T11726] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2559.305953][T11726] ? vfs_write+0x9af/0x1050 [ 2559.310373][T11726] ? vmacache_update+0xb7/0x120 [ 2559.315057][T11726] kernel_clone+0x22d/0x990 [ 2559.319403][T11726] ? file_end_write+0x1b0/0x1b0 [ 2559.324085][T11726] ? __kasan_check_write+0x14/0x20 [ 2559.329155][T11726] ? create_io_thread+0x1e0/0x1e0 [ 2559.334010][T11726] ? __mutex_lock_slowpath+0x10/0x10 [ 2559.339126][T11726] __x64_sys_clone+0x289/0x310 [ 2559.343727][T11726] ? __do_sys_vfork+0x130/0x130 [ 2559.348413][T11726] ? debug_smp_processor_id+0x17/0x20 [ 2559.353617][T11726] do_syscall_64+0x44/0xd0 [ 2559.357871][T11726] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2559.363602][T11726] RIP: 0033:0x7fd2e6d030d9 [ 2559.367857][T11726] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2559.387298][T11726] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2559.395541][T11726] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2559.403347][T11726] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2559.411159][T11726] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 04:06:39 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdd020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:39 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xf4}, 0x80) 04:06:39 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4) [ 2559.418969][T11726] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2559.426806][T11726] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2559.434596][T11726] 04:06:39 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdd030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:39 executing program 1: syz_clone(0x1248002, 0x0, 0x0, 0x0, 0x0, 0x0) 04:06:39 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (fail_nth: 5) 04:06:39 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x300}, 0x80) 04:06:39 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdd040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:39 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x2000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:39 executing program 1: syz_clone(0x1248007, 0x0, 0x0, 0x0, 0x0, 0x0) 04:06:39 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x399}, 0x80) [ 2559.480497][T11740] FAULT_INJECTION: forcing a failure. [ 2559.480497][T11740] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:06:39 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xde000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2559.531615][T11756] FAULT_INJECTION: forcing a failure. [ 2559.531615][T11756] name failslab, interval 1, probability 0, space 0, times 0 [ 2559.546276][T11756] CPU: 0 PID: 11756 Comm: syz-executor.0 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2559.556351][T11756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2559.566251][T11756] Call Trace: [ 2559.569375][T11756] [ 2559.572145][T11756] dump_stack_lvl+0x151/0x1b7 [ 2559.576663][T11756] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2559.581955][T11756] dump_stack+0x15/0x17 [ 2559.586054][T11756] should_fail+0x3c0/0x510 [ 2559.590392][T11756] __should_failslab+0x9f/0xe0 [ 2559.595007][T11756] should_failslab+0x9/0x20 [ 2559.599333][T11756] kmem_cache_alloc+0x4f/0x2f0 [ 2559.603930][T11756] ? alloc_vmap_area+0x6c3/0x1a90 [ 2559.608796][T11756] alloc_vmap_area+0x6c3/0x1a90 [ 2559.613483][T11756] ? vm_map_ram+0xa80/0xa80 [ 2559.617816][T11756] ? __kasan_kmalloc+0x9/0x10 [ 2559.622328][T11756] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2559.627712][T11756] ? __get_vm_area_node+0x13a/0x380 [ 2559.632742][T11756] __get_vm_area_node+0x17b/0x380 [ 2559.637605][T11756] __vmalloc_node_range+0xda/0x800 [ 2559.642552][T11756] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2559.647929][T11756] ? kstrtouint_from_user+0x215/0x2b0 [ 2559.653149][T11756] ? kstrtol_from_user+0x310/0x310 [ 2559.658172][T11756] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2559.663558][T11756] __vmalloc+0x7a/0x90 [ 2559.667459][T11756] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2559.672842][T11756] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2559.678047][T11756] ? bpf_prog_alloc+0x15/0x1f0 [ 2559.682647][T11756] bpf_prog_alloc+0x1f/0x1f0 [ 2559.687074][T11756] bpf_prog_load+0x835/0x1b60 [ 2559.691594][T11756] ? map_freeze+0x360/0x360 [ 2559.695929][T11756] ? selinux_bpf+0xcb/0x100 [ 2559.700277][T11756] ? security_bpf+0xb0/0xd0 [ 2559.704613][T11756] __sys_bpf+0x4c2/0x750 [ 2559.708685][T11756] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2559.713908][T11756] ? debug_smp_processor_id+0x17/0x20 [ 2559.719103][T11756] __x64_sys_bpf+0x7c/0x90 [ 2559.723355][T11756] do_syscall_64+0x44/0xd0 [ 2559.727607][T11756] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2559.733335][T11756] RIP: 0033:0x7f5a864400d9 [ 2559.737587][T11756] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2559.757033][T11756] RSP: 002b:00007f5a851b3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2559.765277][T11756] RAX: ffffffffffffffda RBX: 00007f5a8655ff80 RCX: 00007f5a864400d9 [ 2559.773086][T11756] RDX: 0000000000000080 RSI: 0000000020003680 RDI: 0000000000000005 04:06:40 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x4000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:40 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x3cc}, 0x80) [ 2559.780896][T11756] RBP: 00007f5a851b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2559.788888][T11756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2559.796800][T11756] R13: 00007ffcfda9195f R14: 00007f5a851b3300 R15: 0000000000022000 [ 2559.804701][T11756] [ 2559.807562][T11740] CPU: 1 PID: 11740 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2559.817727][T11740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2559.827616][T11740] Call Trace: [ 2559.830736][T11740] [ 2559.833602][T11740] dump_stack_lvl+0x151/0x1b7 [ 2559.838117][T11740] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2559.843412][T11740] ? stack_trace_save+0x12d/0x1f0 [ 2559.848277][T11740] ? is_bpf_text_address+0x1a2/0x1c0 [ 2559.853395][T11740] dump_stack+0x15/0x17 [ 2559.857387][T11740] should_fail+0x3c0/0x510 [ 2559.861640][T11740] should_fail_alloc_page+0x58/0x70 [ 2559.866671][T11740] __alloc_pages+0x1de/0x7c0 [ 2559.871101][T11740] ? kmem_cache_alloc+0x189/0x2f0 [ 2559.875966][T11740] ? __x64_sys_clone+0x289/0x310 [ 2559.880733][T11740] ? __count_vm_events+0x30/0x30 [ 2559.885509][T11740] __get_free_pages+0xe/0x30 [ 2559.889931][T11740] kasan_populate_vmalloc_pte+0x39/0x130 [ 2559.895398][T11740] ? __apply_to_page_range+0x8a5/0xb90 [ 2559.900696][T11740] __apply_to_page_range+0x8b8/0xb90 [ 2559.905812][T11740] ? kasan_populate_vmalloc+0x70/0x70 [ 2559.911017][T11740] ? kasan_populate_vmalloc+0x70/0x70 [ 2559.916226][T11740] apply_to_page_range+0x3b/0x50 [ 2559.920997][T11740] kasan_populate_vmalloc+0x65/0x70 [ 2559.926030][T11740] alloc_vmap_area+0x1946/0x1a90 [ 2559.930814][T11740] ? vm_map_ram+0xa80/0xa80 [ 2559.935148][T11740] ? __kasan_kmalloc+0x9/0x10 [ 2559.939658][T11740] ? __get_vm_area_node+0x13a/0x380 [ 2559.944692][T11740] __get_vm_area_node+0x17b/0x380 [ 2559.949551][T11740] __vmalloc_node_range+0xda/0x800 [ 2559.954498][T11740] ? copy_process+0x579/0x3250 [ 2559.959098][T11740] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2559.963970][T11740] ? dup_task_struct+0x53/0xa60 [ 2559.968645][T11740] dup_task_struct+0x61f/0xa60 [ 2559.973246][T11740] ? copy_process+0x579/0x3250 [ 2559.977844][T11740] ? __kasan_check_write+0x14/0x20 [ 2559.982794][T11740] copy_process+0x579/0x3250 [ 2559.987219][T11740] ? __kasan_check_write+0x14/0x20 [ 2559.992167][T11740] ? proc_fail_nth_write+0x213/0x290 [ 2559.997287][T11740] ? proc_fail_nth_read+0x220/0x220 [ 2560.002324][T11740] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2560.007272][T11740] ? vfs_write+0x9af/0x1050 [ 2560.011613][T11740] ? vmacache_update+0xb7/0x120 [ 2560.016308][T11740] kernel_clone+0x22d/0x990 [ 2560.020637][T11740] ? file_end_write+0x1b0/0x1b0 [ 2560.025335][T11740] ? __kasan_check_write+0x14/0x20 [ 2560.030282][T11740] ? create_io_thread+0x1e0/0x1e0 [ 2560.035129][T11740] ? __mutex_lock_slowpath+0x10/0x10 [ 2560.040252][T11740] __x64_sys_clone+0x289/0x310 [ 2560.044850][T11740] ? __do_sys_vfork+0x130/0x130 [ 2560.049537][T11740] ? debug_smp_processor_id+0x17/0x20 [ 2560.054745][T11740] do_syscall_64+0x44/0xd0 [ 2560.058996][T11740] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2560.064735][T11740] RIP: 0033:0x7fd2e6d030d9 [ 2560.069008][T11740] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2560.088511][T11740] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2560.096759][T11740] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2560.104562][T11740] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2560.112372][T11740] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2560.120182][T11740] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2560.128000][T11740] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2560.135812][T11740] 04:06:40 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5) 04:06:40 executing program 1: syz_clone(0x1248008, 0x0, 0x0, 0x0, 0x0, 0x0) 04:06:40 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xde010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2560.192890][T11771] FAULT_INJECTION: forcing a failure. [ 2560.192890][T11771] name failslab, interval 1, probability 0, space 0, times 0 [ 2560.206202][T11771] CPU: 0 PID: 11771 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2560.216369][T11771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2560.226256][T11771] Call Trace: [ 2560.229371][T11771] [ 2560.232160][T11771] dump_stack_lvl+0x151/0x1b7 [ 2560.236660][T11771] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2560.241957][T11771] dump_stack+0x15/0x17 [ 2560.246058][T11771] should_fail+0x3c0/0x510 [ 2560.250311][T11771] ? alloc_fdtable+0xaf/0x2b0 [ 2560.254887][T11771] __should_failslab+0x9f/0xe0 [ 2560.259424][T11771] should_failslab+0x9/0x20 [ 2560.263765][T11771] kmem_cache_alloc_trace+0x4a/0x310 [ 2560.269066][T11771] ? __kasan_check_write+0x14/0x20 [ 2560.274013][T11771] ? _raw_spin_lock+0xa3/0x1b0 [ 2560.278613][T11771] alloc_fdtable+0xaf/0x2b0 [ 2560.282961][T11771] dup_fd+0x781/0xa40 [ 2560.286777][T11771] ? avc_has_perm+0x16d/0x260 [ 2560.291293][T11771] copy_files+0xe6/0x200 [ 2560.295369][T11771] ? perf_event_attrs+0x30/0x30 [ 2560.300059][T11771] ? dup_task_struct+0xa60/0xa60 [ 2560.304827][T11771] ? security_task_alloc+0x132/0x150 [ 2560.309945][T11771] copy_process+0x11e9/0x3250 [ 2560.314563][T11771] ? proc_fail_nth_write+0x213/0x290 [ 2560.319684][T11771] ? proc_fail_nth_read+0x220/0x220 [ 2560.324719][T11771] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2560.329853][T11771] ? vfs_write+0x9af/0x1050 [ 2560.334195][T11771] ? vmacache_update+0xb7/0x120 [ 2560.338880][T11771] kernel_clone+0x22d/0x990 [ 2560.343223][T11771] ? file_end_write+0x1b0/0x1b0 [ 2560.347905][T11771] ? __kasan_check_write+0x14/0x20 [ 2560.352850][T11771] ? create_io_thread+0x1e0/0x1e0 [ 2560.357711][T11771] ? __mutex_lock_slowpath+0x10/0x10 [ 2560.362833][T11771] __x64_sys_clone+0x289/0x310 [ 2560.367432][T11771] ? __do_sys_vfork+0x130/0x130 [ 2560.372122][T11771] ? debug_smp_processor_id+0x17/0x20 [ 2560.377329][T11771] do_syscall_64+0x44/0xd0 [ 2560.381791][T11771] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2560.387519][T11771] RIP: 0033:0x7fd2e6d030d9 [ 2560.391774][T11771] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2560.411213][T11771] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2560.419471][T11771] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2560.427270][T11771] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2560.435081][T11771] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 04:06:40 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (fail_nth: 6) 04:06:40 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x500}, 0x80) 04:06:40 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xde020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:40 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x4c00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:40 executing program 1: syz_clone(0x1248009, 0x0, 0x0, 0x0, 0x0, 0x0) 04:06:40 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x600}, 0x80) 04:06:40 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xde030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:40 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 6) 04:06:40 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x700}, 0x80) [ 2560.442892][T11771] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2560.450703][T11771] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2560.458517][T11771] 04:06:40 executing program 1: syz_clone(0x1248011, 0x0, 0x0, 0x0, 0x0, 0x0) 04:06:40 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x900}, 0x80) [ 2560.497310][T11780] FAULT_INJECTION: forcing a failure. [ 2560.497310][T11780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2560.511302][T11791] FAULT_INJECTION: forcing a failure. [ 2560.511302][T11791] name failslab, interval 1, probability 0, space 0, times 0 [ 2560.526064][T11791] CPU: 0 PID: 11791 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2560.536143][T11791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2560.546037][T11791] Call Trace: [ 2560.549158][T11791] [ 2560.551934][T11791] dump_stack_lvl+0x151/0x1b7 [ 2560.556447][T11791] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2560.561743][T11791] dump_stack+0x15/0x17 [ 2560.565731][T11791] should_fail+0x3c0/0x510 [ 2560.569987][T11791] ? kvmalloc_node+0x82/0x130 [ 2560.574500][T11791] __should_failslab+0x9f/0xe0 [ 2560.579098][T11791] should_failslab+0x9/0x20 [ 2560.583441][T11791] __kmalloc+0x6d/0x350 [ 2560.587436][T11791] ? __kasan_kmalloc+0x9/0x10 [ 2560.591944][T11791] kvmalloc_node+0x82/0x130 [ 2560.596283][T11791] alloc_fdtable+0xea/0x2b0 [ 2560.600623][T11791] dup_fd+0x781/0xa40 [ 2560.604441][T11791] ? avc_has_perm+0x16d/0x260 [ 2560.608959][T11791] copy_files+0xe6/0x200 [ 2560.613044][T11791] ? perf_event_attrs+0x30/0x30 [ 2560.617818][T11791] ? dup_task_struct+0xa60/0xa60 [ 2560.622591][T11791] ? security_task_alloc+0x132/0x150 [ 2560.627932][T11791] copy_process+0x11e9/0x3250 [ 2560.632441][T11791] ? proc_fail_nth_write+0x213/0x290 [ 2560.637559][T11791] ? proc_fail_nth_read+0x220/0x220 [ 2560.642595][T11791] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2560.647538][T11791] ? vfs_write+0x9af/0x1050 [ 2560.651880][T11791] ? vmacache_update+0xb7/0x120 [ 2560.656564][T11791] kernel_clone+0x22d/0x990 [ 2560.660905][T11791] ? file_end_write+0x1b0/0x1b0 [ 2560.665592][T11791] ? __kasan_check_write+0x14/0x20 [ 2560.670538][T11791] ? create_io_thread+0x1e0/0x1e0 [ 2560.675402][T11791] ? __mutex_lock_slowpath+0x10/0x10 [ 2560.680519][T11791] __x64_sys_clone+0x289/0x310 [ 2560.685125][T11791] ? __do_sys_vfork+0x130/0x130 [ 2560.689809][T11791] ? debug_smp_processor_id+0x17/0x20 [ 2560.695020][T11791] do_syscall_64+0x44/0xd0 [ 2560.699268][T11791] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2560.704994][T11791] RIP: 0033:0x7fd2e6d030d9 [ 2560.709260][T11791] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2560.728687][T11791] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2560.736931][T11791] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 04:06:41 executing program 1: syz_clone(0x1248000, 0x0, 0x2, 0x0, 0x0, 0x0) [ 2560.744746][T11791] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2560.752557][T11791] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2560.760545][T11791] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2560.768351][T11791] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2560.776167][T11791] [ 2560.779026][T11780] CPU: 1 PID: 11780 Comm: syz-executor.0 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2560.789278][T11780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2560.799164][T11780] Call Trace: [ 2560.802311][T11780] [ 2560.805064][T11780] dump_stack_lvl+0x151/0x1b7 [ 2560.809579][T11780] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2560.814869][T11780] ? stack_trace_save+0x12d/0x1f0 [ 2560.819730][T11780] ? is_bpf_text_address+0x1a2/0x1c0 [ 2560.824849][T11780] dump_stack+0x15/0x17 [ 2560.828841][T11780] should_fail+0x3c0/0x510 [ 2560.833097][T11780] should_fail_alloc_page+0x58/0x70 [ 2560.838135][T11780] __alloc_pages+0x1de/0x7c0 [ 2560.842556][T11780] ? kmem_cache_alloc+0x189/0x2f0 [ 2560.847427][T11780] ? bpf_prog_load+0x835/0x1b60 [ 2560.852103][T11780] ? __count_vm_events+0x30/0x30 [ 2560.856965][T11780] __get_free_pages+0xe/0x30 [ 2560.861397][T11780] kasan_populate_vmalloc_pte+0x39/0x130 [ 2560.867207][T11780] ? __apply_to_page_range+0x8a5/0xb90 [ 2560.872508][T11780] __apply_to_page_range+0x8b8/0xb90 [ 2560.877620][T11780] ? kasan_populate_vmalloc+0x70/0x70 [ 2560.882827][T11780] ? kasan_populate_vmalloc+0x70/0x70 [ 2560.888035][T11780] apply_to_page_range+0x3b/0x50 [ 2560.892808][T11780] kasan_populate_vmalloc+0x65/0x70 [ 2560.897841][T11780] alloc_vmap_area+0x1946/0x1a90 [ 2560.902626][T11780] ? vm_map_ram+0xa80/0xa80 [ 2560.906954][T11780] ? __kasan_kmalloc+0x9/0x10 [ 2560.911468][T11780] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2560.916849][T11780] ? __get_vm_area_node+0x13a/0x380 [ 2560.921891][T11780] __get_vm_area_node+0x17b/0x380 [ 2560.926753][T11780] __vmalloc_node_range+0xda/0x800 [ 2560.931689][T11780] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2560.937074][T11780] ? kstrtouint_from_user+0x215/0x2b0 [ 2560.942280][T11780] ? kstrtol_from_user+0x310/0x310 [ 2560.947227][T11780] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2560.952605][T11780] __vmalloc+0x7a/0x90 [ 2560.956533][T11780] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2560.961893][T11780] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2560.967197][T11780] ? bpf_prog_alloc+0x15/0x1f0 [ 2560.971791][T11780] bpf_prog_alloc+0x1f/0x1f0 [ 2560.976225][T11780] bpf_prog_load+0x835/0x1b60 [ 2560.980732][T11780] ? map_freeze+0x360/0x360 [ 2560.985068][T11780] ? selinux_bpf+0xcb/0x100 [ 2560.989520][T11780] ? security_bpf+0xb0/0xd0 [ 2560.993869][T11780] __sys_bpf+0x4c2/0x750 [ 2560.997941][T11780] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2561.003149][T11780] ? debug_smp_processor_id+0x17/0x20 [ 2561.008356][T11780] __x64_sys_bpf+0x7c/0x90 [ 2561.012608][T11780] do_syscall_64+0x44/0xd0 [ 2561.016859][T11780] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2561.022590][T11780] RIP: 0033:0x7f5a864400d9 [ 2561.026857][T11780] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:06:41 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (fail_nth: 7) 04:06:41 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xde040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:41 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x5000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:41 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 7) 04:06:41 executing program 1: syz_clone(0x1248000, 0x0, 0x7, 0x0, 0x0, 0x0) 04:06:41 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xa00}, 0x80) 04:06:41 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdf000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2561.046293][T11780] RSP: 002b:00007f5a851b3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2561.054528][T11780] RAX: ffffffffffffffda RBX: 00007f5a8655ff80 RCX: 00007f5a864400d9 [ 2561.062337][T11780] RDX: 0000000000000080 RSI: 0000000020003680 RDI: 0000000000000005 [ 2561.070149][T11780] RBP: 00007f5a851b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2561.077960][T11780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2561.085771][T11780] R13: 00007ffcfda9195f R14: 00007f5a851b3300 R15: 0000000000022000 [ 2561.093588][T11780] 04:06:41 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xb00}, 0x80) [ 2561.128964][T11806] FAULT_INJECTION: forcing a failure. [ 2561.128964][T11806] name failslab, interval 1, probability 0, space 0, times 0 [ 2561.133308][T11811] FAULT_INJECTION: forcing a failure. [ 2561.133308][T11811] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2561.156538][T11811] CPU: 0 PID: 11811 Comm: syz-executor.0 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2561.166619][T11811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2561.176525][T11811] Call Trace: [ 2561.179641][T11811] [ 2561.182414][T11811] dump_stack_lvl+0x151/0x1b7 [ 2561.186925][T11811] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2561.192222][T11811] dump_stack+0x15/0x17 [ 2561.196236][T11811] should_fail+0x3c0/0x510 [ 2561.200463][T11811] should_fail_alloc_page+0x58/0x70 [ 2561.205496][T11811] __alloc_pages+0x1de/0x7c0 [ 2561.209959][T11811] ? __count_vm_events+0x30/0x30 [ 2561.214703][T11811] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2561.219901][T11811] __get_free_pages+0xe/0x30 [ 2561.224330][T11811] kasan_populate_vmalloc_pte+0x39/0x130 [ 2561.229799][T11811] ? __apply_to_page_range+0x8a5/0xb90 [ 2561.235091][T11811] __apply_to_page_range+0x8b8/0xb90 [ 2561.240211][T11811] ? kasan_populate_vmalloc+0x70/0x70 [ 2561.245432][T11811] ? kasan_populate_vmalloc+0x70/0x70 [ 2561.250626][T11811] apply_to_page_range+0x3b/0x50 [ 2561.255485][T11811] kasan_populate_vmalloc+0x65/0x70 [ 2561.260519][T11811] alloc_vmap_area+0x1946/0x1a90 [ 2561.265309][T11811] ? vm_map_ram+0xa80/0xa80 [ 2561.269632][T11811] ? __kasan_kmalloc+0x9/0x10 [ 2561.274147][T11811] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2561.279528][T11811] ? __get_vm_area_node+0x13a/0x380 [ 2561.284570][T11811] __get_vm_area_node+0x17b/0x380 [ 2561.289425][T11811] __vmalloc_node_range+0xda/0x800 [ 2561.294369][T11811] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2561.299748][T11811] ? kstrtouint_from_user+0x215/0x2b0 [ 2561.304956][T11811] ? kstrtol_from_user+0x310/0x310 [ 2561.309904][T11811] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2561.315292][T11811] __vmalloc+0x7a/0x90 [ 2561.319198][T11811] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2561.324573][T11811] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2561.329787][T11811] ? bpf_prog_alloc+0x15/0x1f0 [ 2561.334378][T11811] bpf_prog_alloc+0x1f/0x1f0 [ 2561.338807][T11811] bpf_prog_load+0x835/0x1b60 [ 2561.343321][T11811] ? map_freeze+0x360/0x360 [ 2561.347661][T11811] ? selinux_bpf+0xcb/0x100 [ 2561.352000][T11811] ? security_bpf+0xb0/0xd0 [ 2561.356340][T11811] __sys_bpf+0x4c2/0x750 [ 2561.360419][T11811] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2561.365699][T11811] ? debug_smp_processor_id+0x17/0x20 [ 2561.370954][T11811] __x64_sys_bpf+0x7c/0x90 [ 2561.375207][T11811] do_syscall_64+0x44/0xd0 [ 2561.379462][T11811] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2561.385178][T11811] RIP: 0033:0x7f5a864400d9 [ 2561.389435][T11811] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2561.408889][T11811] RSP: 002b:00007f5a851b3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2561.417117][T11811] RAX: ffffffffffffffda RBX: 00007f5a8655ff80 RCX: 00007f5a864400d9 04:06:41 executing program 1: syz_clone(0x1248000, 0x0, 0x8, 0x0, 0x0, 0x0) 04:06:41 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdf010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:41 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x5902, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2561.424929][T11811] RDX: 0000000000000080 RSI: 0000000020003680 RDI: 0000000000000005 [ 2561.432826][T11811] RBP: 00007f5a851b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2561.440650][T11811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2561.448453][T11811] R13: 00007ffcfda9195f R14: 00007f5a851b3300 R15: 0000000000022000 [ 2561.456270][T11811] [ 2561.459132][T11806] CPU: 1 PID: 11806 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2561.469207][T11806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 04:06:41 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (fail_nth: 8) [ 2561.479097][T11806] Call Trace: [ 2561.482228][T11806] [ 2561.484994][T11806] dump_stack_lvl+0x151/0x1b7 [ 2561.488117][T11822] FAULT_INJECTION: forcing a failure. [ 2561.488117][T11822] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2561.489503][T11806] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2561.489530][T11806] dump_stack+0x15/0x17 [ 2561.489546][T11806] should_fail+0x3c0/0x510 [ 2561.489568][T11806] ? kvmalloc_node+0x82/0x130 [ 2561.520578][T11806] __should_failslab+0x9f/0xe0 [ 2561.525175][T11806] should_failslab+0x9/0x20 [ 2561.529514][T11806] __kmalloc+0x6d/0x350 [ 2561.533508][T11806] ? kvmalloc_node+0x82/0x130 [ 2561.538020][T11806] kvmalloc_node+0x82/0x130 [ 2561.542363][T11806] alloc_fdtable+0x173/0x2b0 [ 2561.546788][T11806] dup_fd+0x781/0xa40 [ 2561.550612][T11806] ? avc_has_perm+0x16d/0x260 [ 2561.555122][T11806] copy_files+0xe6/0x200 [ 2561.559198][T11806] ? perf_event_attrs+0x30/0x30 [ 2561.563890][T11806] ? dup_task_struct+0xa60/0xa60 [ 2561.568657][T11806] ? security_task_alloc+0x132/0x150 [ 2561.573778][T11806] copy_process+0x11e9/0x3250 [ 2561.578296][T11806] ? proc_fail_nth_write+0x213/0x290 [ 2561.583415][T11806] ? proc_fail_nth_read+0x220/0x220 [ 2561.588446][T11806] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2561.593400][T11806] ? vfs_write+0x9af/0x1050 [ 2561.597736][T11806] ? vmacache_update+0xb7/0x120 [ 2561.602419][T11806] kernel_clone+0x22d/0x990 [ 2561.606757][T11806] ? file_end_write+0x1b0/0x1b0 [ 2561.611443][T11806] ? __kasan_check_write+0x14/0x20 [ 2561.616397][T11806] ? create_io_thread+0x1e0/0x1e0 [ 2561.621253][T11806] ? __mutex_lock_slowpath+0x10/0x10 [ 2561.626378][T11806] __x64_sys_clone+0x289/0x310 [ 2561.630972][T11806] ? __do_sys_vfork+0x130/0x130 [ 2561.635662][T11806] ? debug_smp_processor_id+0x17/0x20 [ 2561.640866][T11806] do_syscall_64+0x44/0xd0 [ 2561.645121][T11806] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2561.650849][T11806] RIP: 0033:0x7fd2e6d030d9 [ 2561.655112][T11806] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:06:41 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xc00}, 0x80) [ 2561.674548][T11806] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2561.682785][T11806] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2561.690604][T11806] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2561.698416][T11806] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2561.706219][T11806] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2561.714030][T11806] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2561.721863][T11806] 04:06:42 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdf020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:42 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xd00}, 0x80) [ 2561.733532][T11822] CPU: 1 PID: 11822 Comm: syz-executor.0 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2561.743606][T11822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2561.753544][T11822] Call Trace: [ 2561.756622][T11822] [ 2561.759398][T11822] dump_stack_lvl+0x151/0x1b7 [ 2561.763916][T11822] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2561.769214][T11822] dump_stack+0x15/0x17 [ 2561.773228][T11822] should_fail+0x3c0/0x510 [ 2561.777470][T11822] should_fail_alloc_page+0x58/0x70 [ 2561.782490][T11822] __alloc_pages+0x1de/0x7c0 [ 2561.786942][T11822] ? __count_vm_events+0x30/0x30 [ 2561.791684][T11822] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2561.796890][T11822] __get_free_pages+0xe/0x30 [ 2561.801317][T11822] kasan_populate_vmalloc_pte+0x39/0x130 [ 2561.806795][T11822] ? __apply_to_page_range+0x8a5/0xb90 [ 2561.812080][T11822] __apply_to_page_range+0x8b8/0xb90 [ 2561.817199][T11822] ? kasan_populate_vmalloc+0x70/0x70 [ 2561.822407][T11822] ? kasan_populate_vmalloc+0x70/0x70 [ 2561.827611][T11822] apply_to_page_range+0x3b/0x50 [ 2561.832386][T11822] kasan_populate_vmalloc+0x65/0x70 [ 2561.837507][T11822] alloc_vmap_area+0x1946/0x1a90 [ 2561.842370][T11822] ? vm_map_ram+0xa80/0xa80 [ 2561.846708][T11822] ? __kasan_kmalloc+0x9/0x10 [ 2561.851219][T11822] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2561.856614][T11822] ? __get_vm_area_node+0x13a/0x380 [ 2561.861637][T11822] __get_vm_area_node+0x17b/0x380 [ 2561.866512][T11822] __vmalloc_node_range+0xda/0x800 [ 2561.871449][T11822] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2561.876830][T11822] ? kstrtouint_from_user+0x215/0x2b0 [ 2561.882136][T11822] ? kstrtol_from_user+0x310/0x310 [ 2561.887078][T11822] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2561.892461][T11822] __vmalloc+0x7a/0x90 [ 2561.896358][T11822] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2561.901736][T11822] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2561.906952][T11822] ? bpf_prog_alloc+0x15/0x1f0 [ 2561.911542][T11822] bpf_prog_alloc+0x1f/0x1f0 [ 2561.915977][T11822] bpf_prog_load+0x835/0x1b60 [ 2561.920484][T11822] ? map_freeze+0x360/0x360 [ 2561.924845][T11822] ? selinux_bpf+0xcb/0x100 [ 2561.929158][T11822] ? security_bpf+0xb0/0xd0 [ 2561.933498][T11822] __sys_bpf+0x4c2/0x750 [ 2561.937577][T11822] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2561.942787][T11822] ? debug_smp_processor_id+0x17/0x20 [ 2561.947992][T11822] __x64_sys_bpf+0x7c/0x90 [ 2561.952244][T11822] do_syscall_64+0x44/0xd0 [ 2561.956499][T11822] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2561.962224][T11822] RIP: 0033:0x7f5a864400d9 [ 2561.966481][T11822] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2561.986267][T11822] RSP: 002b:00007f5a851b3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2561.994518][T11822] RAX: ffffffffffffffda RBX: 00007f5a8655ff80 RCX: 00007f5a864400d9 [ 2562.002414][T11822] RDX: 0000000000000080 RSI: 0000000020003680 RDI: 0000000000000005 [ 2562.010228][T11822] RBP: 00007f5a851b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2562.018050][T11822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2562.025844][T11822] R13: 00007ffcfda9195f R14: 00007f5a851b3300 R15: 0000000000022000 04:06:42 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 8) 04:06:42 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xe00}, 0x80) 04:06:42 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x7100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:42 executing program 1: syz_clone(0x1248000, 0x0, 0x9, 0x0, 0x0, 0x0) 04:06:42 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (fail_nth: 9) 04:06:42 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdf030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2562.033860][T11822] 04:06:42 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x1100}, 0x80) 04:06:42 executing program 1: syz_clone(0x1248000, 0x0, 0x11, 0x0, 0x0, 0x0) [ 2562.059229][T11841] FAULT_INJECTION: forcing a failure. [ 2562.059229][T11841] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2562.062277][T11843] FAULT_INJECTION: forcing a failure. [ 2562.062277][T11843] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2562.085359][T11843] CPU: 1 PID: 11843 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2562.095348][T11843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2562.105238][T11843] Call Trace: 04:06:42 executing program 1: syz_clone(0x1248000, 0x0, 0x50, 0x0, 0x0, 0x0) 04:06:42 executing program 1: syz_clone(0x1248000, 0x0, 0x700, 0x0, 0x0, 0x0) 04:06:42 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x7d02, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2562.108381][T11843] [ 2562.111140][T11843] dump_stack_lvl+0x151/0x1b7 [ 2562.115654][T11843] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2562.120949][T11843] dump_stack+0x15/0x17 [ 2562.124940][T11843] should_fail+0x3c0/0x510 [ 2562.129193][T11843] should_fail_alloc_page+0x58/0x70 [ 2562.134227][T11843] __alloc_pages+0x1de/0x7c0 [ 2562.138653][T11843] ? __count_vm_events+0x30/0x30 [ 2562.143426][T11843] ? __kasan_kmalloc+0x9/0x10 [ 2562.148125][T11843] ? __kmalloc+0x203/0x350 [ 2562.152373][T11843] ? __vmalloc_node_range+0x2e3/0x800 [ 2562.157587][T11843] __vmalloc_node_range+0x48f/0x800 [ 2562.162610][T11843] dup_task_struct+0x61f/0xa60 [ 2562.167206][T11843] ? copy_process+0x579/0x3250 [ 2562.171815][T11843] ? __kasan_check_write+0x14/0x20 [ 2562.176763][T11843] copy_process+0x579/0x3250 [ 2562.181198][T11843] ? __kasan_check_write+0x14/0x20 [ 2562.186129][T11843] ? proc_fail_nth_write+0x213/0x290 [ 2562.191523][T11843] ? proc_fail_nth_read+0x220/0x220 [ 2562.196541][T11843] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2562.201497][T11843] ? vfs_write+0x9af/0x1050 04:06:42 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0xc503, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2562.205845][T11843] ? vmacache_update+0xb7/0x120 [ 2562.210536][T11843] kernel_clone+0x22d/0x990 [ 2562.214945][T11843] ? file_end_write+0x1b0/0x1b0 [ 2562.219630][T11843] ? __kasan_check_write+0x14/0x20 [ 2562.224672][T11843] ? create_io_thread+0x1e0/0x1e0 [ 2562.229521][T11843] ? __mutex_lock_slowpath+0x10/0x10 [ 2562.234645][T11843] __x64_sys_clone+0x289/0x310 [ 2562.239244][T11843] ? __do_sys_vfork+0x130/0x130 [ 2562.243935][T11843] ? debug_smp_processor_id+0x17/0x20 [ 2562.249227][T11843] do_syscall_64+0x44/0xd0 [ 2562.253476][T11843] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2562.259911][T11843] RIP: 0033:0x7fd2e6d030d9 [ 2562.265290][T11843] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2562.284734][T11843] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2562.292979][T11843] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2562.300798][T11843] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2562.308598][T11843] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2562.316405][T11843] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2562.324223][T11843] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2562.332036][T11843] [ 2562.334984][T11841] CPU: 0 PID: 11841 Comm: syz-executor.0 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2562.344965][T11841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2562.355033][T11841] Call Trace: [ 2562.358156][T11841] [ 2562.360940][T11841] dump_stack_lvl+0x151/0x1b7 [ 2562.365459][T11841] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2562.370747][T11841] dump_stack+0x15/0x17 [ 2562.374735][T11841] should_fail+0x3c0/0x510 [ 2562.378990][T11841] should_fail_alloc_page+0x58/0x70 [ 2562.384034][T11841] __alloc_pages+0x1de/0x7c0 [ 2562.388448][T11841] ? __count_vm_events+0x30/0x30 [ 2562.393222][T11841] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2562.398433][T11841] __get_free_pages+0xe/0x30 [ 2562.402857][T11841] kasan_populate_vmalloc_pte+0x39/0x130 [ 2562.408331][T11841] ? __apply_to_page_range+0x8a5/0xb90 [ 2562.413797][T11841] __apply_to_page_range+0x8b8/0xb90 [ 2562.418915][T11841] ? kasan_populate_vmalloc+0x70/0x70 [ 2562.424132][T11841] ? kasan_populate_vmalloc+0x70/0x70 [ 2562.429325][T11841] apply_to_page_range+0x3b/0x50 [ 2562.434102][T11841] kasan_populate_vmalloc+0x65/0x70 [ 2562.439132][T11841] alloc_vmap_area+0x1946/0x1a90 [ 2562.443919][T11841] ? vm_map_ram+0xa80/0xa80 [ 2562.448250][T11841] ? __kasan_kmalloc+0x9/0x10 [ 2562.452758][T11841] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2562.458144][T11841] ? __get_vm_area_node+0x13a/0x380 [ 2562.463178][T11841] __get_vm_area_node+0x17b/0x380 [ 2562.468036][T11841] __vmalloc_node_range+0xda/0x800 [ 2562.472986][T11841] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2562.478450][T11841] ? kstrtouint_from_user+0x215/0x2b0 [ 2562.483659][T11841] ? kstrtol_from_user+0x310/0x310 [ 2562.488607][T11841] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2562.494072][T11841] __vmalloc+0x7a/0x90 [ 2562.497988][T11841] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2562.503362][T11841] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 2562.508588][T11841] ? bpf_prog_alloc+0x15/0x1f0 [ 2562.513124][T11870] FAULT_INJECTION: forcing a failure. [ 2562.513124][T11870] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2562.513180][T11841] bpf_prog_alloc+0x1f/0x1f0 [ 2562.530614][T11841] bpf_prog_load+0x835/0x1b60 [ 2562.535128][T11841] ? map_freeze+0x360/0x360 [ 2562.539476][T11841] ? selinux_bpf+0xcb/0x100 [ 2562.543803][T11841] ? security_bpf+0xb0/0xd0 [ 2562.548146][T11841] __sys_bpf+0x4c2/0x750 [ 2562.552222][T11841] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2562.557434][T11841] ? debug_smp_processor_id+0x17/0x20 [ 2562.562637][T11841] __x64_sys_bpf+0x7c/0x90 [ 2562.566892][T11841] do_syscall_64+0x44/0xd0 [ 2562.571143][T11841] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2562.576870][T11841] RIP: 0033:0x7f5a864400d9 [ 2562.581212][T11841] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2562.600653][T11841] RSP: 002b:00007f5a851b3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 04:06:42 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 9) 04:06:42 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdf040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:42 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe0000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:42 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe0010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2562.609420][T11841] RAX: ffffffffffffffda RBX: 00007f5a8655ff80 RCX: 00007f5a864400d9 [ 2562.617229][T11841] RDX: 0000000000000080 RSI: 0000000020003680 RDI: 0000000000000005 [ 2562.625038][T11841] RBP: 00007f5a851b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2562.632853][T11841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2562.640663][T11841] R13: 00007ffcfda9195f R14: 00007f5a851b3300 R15: 0000000000022000 [ 2562.648486][T11841] [ 2562.655803][T11870] CPU: 1 PID: 11870 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2562.665871][T11870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2562.675768][T11870] Call Trace: [ 2562.678890][T11870] [ 2562.681666][T11870] dump_stack_lvl+0x151/0x1b7 [ 2562.686178][T11870] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2562.691475][T11870] dump_stack+0x15/0x17 [ 2562.695465][T11870] should_fail+0x3c0/0x510 [ 2562.699718][T11870] should_fail_alloc_page+0x58/0x70 [ 2562.704753][T11870] __alloc_pages+0x1de/0x7c0 [ 2562.709181][T11870] ? __count_vm_events+0x30/0x30 [ 2562.713953][T11870] ? __kasan_kmalloc+0x9/0x10 [ 2562.718810][T11870] ? __kmalloc+0x203/0x350 [ 2562.723066][T11870] ? __vmalloc_node_range+0x2e3/0x800 [ 2562.728287][T11870] __vmalloc_node_range+0x48f/0x800 [ 2562.733337][T11870] dup_task_struct+0x61f/0xa60 [ 2562.737905][T11870] ? copy_process+0x579/0x3250 [ 2562.742512][T11870] ? __kasan_check_write+0x14/0x20 [ 2562.747454][T11870] copy_process+0x579/0x3250 [ 2562.751880][T11870] ? __kasan_check_write+0x14/0x20 [ 2562.756830][T11870] ? proc_fail_nth_write+0x213/0x290 [ 2562.761949][T11870] ? proc_fail_nth_read+0x220/0x220 [ 2562.766984][T11870] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2562.771931][T11870] ? vfs_write+0x9af/0x1050 [ 2562.776267][T11870] ? vmacache_update+0xb7/0x120 [ 2562.780954][T11870] kernel_clone+0x22d/0x990 [ 2562.785293][T11870] ? file_end_write+0x1b0/0x1b0 [ 2562.789982][T11870] ? __kasan_check_write+0x14/0x20 [ 2562.794931][T11870] ? create_io_thread+0x1e0/0x1e0 [ 2562.799790][T11870] ? __mutex_lock_slowpath+0x10/0x10 [ 2562.804910][T11870] __x64_sys_clone+0x289/0x310 [ 2562.809509][T11870] ? __do_sys_vfork+0x130/0x130 [ 2562.814199][T11870] ? debug_smp_processor_id+0x17/0x20 [ 2562.819405][T11870] do_syscall_64+0x44/0xd0 [ 2562.823663][T11870] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2562.829385][T11870] RIP: 0033:0x7fd2e6d030d9 [ 2562.833637][T11870] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2562.853169][T11870] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 04:06:43 executing program 1: syz_clone(0x1248000, 0x0, 0x900, 0x0, 0x0, 0x0) 04:06:43 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:43 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe0020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x1200}, 0x80) 04:06:43 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0xcc03, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2562.861408][T11870] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2562.869224][T11870] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2562.877147][T11870] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2562.885199][T11870] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2562.893005][T11870] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2562.900834][T11870] 04:06:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x1800}, 0x80) 04:06:43 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe0030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:43 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 10) 04:06:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x2000}, 0x80) 04:06:43 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe0040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:43 executing program 1: syz_clone(0x1248000, 0x0, 0x1100, 0x0, 0x0, 0x0) 04:06:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x2500}, 0x80) 04:06:43 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2563.144348][T11889] FAULT_INJECTION: forcing a failure. [ 2563.144348][T11889] name failslab, interval 1, probability 0, space 0, times 0 [ 2563.156968][T11889] CPU: 0 PID: 11889 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2563.167043][T11889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2563.176929][T11889] Call Trace: [ 2563.180049][T11889] [ 2563.182828][T11889] dump_stack_lvl+0x151/0x1b7 [ 2563.187440][T11889] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2563.192751][T11889] dump_stack+0x15/0x17 [ 2563.196714][T11889] should_fail+0x3c0/0x510 [ 2563.200968][T11889] __should_failslab+0x9f/0xe0 [ 2563.205565][T11889] should_failslab+0x9/0x20 [ 2563.209917][T11889] kmem_cache_alloc+0x4f/0x2f0 [ 2563.214519][T11889] ? copy_signal+0x55/0x610 [ 2563.218847][T11889] copy_signal+0x55/0x610 [ 2563.223011][T11889] copy_process+0x126a/0x3250 [ 2563.227523][T11889] ? proc_fail_nth_write+0x213/0x290 [ 2563.232734][T11889] ? proc_fail_nth_read+0x220/0x220 [ 2563.238066][T11889] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2563.242973][T11889] ? vfs_write+0x9af/0x1050 [ 2563.247312][T11889] ? vmacache_update+0xb7/0x120 [ 2563.251999][T11889] kernel_clone+0x22d/0x990 [ 2563.256343][T11889] ? file_end_write+0x1b0/0x1b0 [ 2563.261124][T11889] ? __kasan_check_write+0x14/0x20 [ 2563.266063][T11889] ? create_io_thread+0x1e0/0x1e0 [ 2563.270921][T11889] ? __mutex_lock_slowpath+0x10/0x10 [ 2563.276146][T11889] __x64_sys_clone+0x289/0x310 [ 2563.280730][T11889] ? __do_sys_vfork+0x130/0x130 [ 2563.285520][T11889] ? debug_smp_processor_id+0x17/0x20 [ 2563.290706][T11889] do_syscall_64+0x44/0xd0 [ 2563.294963][T11889] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2563.300691][T11889] RIP: 0033:0x7fd2e6d030d9 [ 2563.304941][T11889] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2563.324498][T11889] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2563.332737][T11889] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 04:06:43 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x2, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x4100}, 0x80) 04:06:43 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x30000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:43 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe1010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:43 executing program 1: syz_clone(0x1248000, 0x0, 0x1f00, 0x0, 0x0, 0x0) 04:06:43 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe1020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:43 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 11) 04:06:43 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x3, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x4800}, 0x80) [ 2563.340762][T11889] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2563.348538][T11889] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2563.356533][T11889] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2563.364344][T11889] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2563.372222][T11889] 04:06:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x4c00}, 0x80) 04:06:43 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe1030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:43 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x4, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:43 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x6, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:43 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x70000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:43 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe1040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:43 executing program 1: syz_clone(0x1248000, 0x0, 0x2000, 0x0, 0x0, 0x0) 04:06:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x6400}, 0x80) 04:06:43 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe2000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2563.427769][T11917] FAULT_INJECTION: forcing a failure. [ 2563.427769][T11917] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2563.502137][T11917] CPU: 0 PID: 11917 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2563.512220][T11917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2563.522212][T11917] Call Trace: [ 2563.525368][T11917] [ 2563.528110][T11917] dump_stack_lvl+0x151/0x1b7 [ 2563.532643][T11917] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2563.538095][T11917] dump_stack+0x15/0x17 [ 2563.542082][T11917] should_fail+0x3c0/0x510 [ 2563.546422][T11917] should_fail_alloc_page+0x58/0x70 [ 2563.551458][T11917] __alloc_pages+0x1de/0x7c0 [ 2563.555883][T11917] ? __count_vm_events+0x30/0x30 [ 2563.560743][T11917] ? __kasan_kmalloc+0x9/0x10 [ 2563.565256][T11917] ? __kmalloc+0x203/0x350 [ 2563.569519][T11917] ? __vmalloc_node_range+0x2e3/0x800 [ 2563.574719][T11917] __vmalloc_node_range+0x48f/0x800 [ 2563.579842][T11917] dup_task_struct+0x61f/0xa60 [ 2563.584598][T11917] ? copy_process+0x579/0x3250 [ 2563.589198][T11917] ? __kasan_check_write+0x14/0x20 [ 2563.594143][T11917] copy_process+0x579/0x3250 [ 2563.598657][T11917] ? __kasan_check_write+0x14/0x20 [ 2563.603603][T11917] ? proc_fail_nth_write+0x213/0x290 [ 2563.608721][T11917] ? proc_fail_nth_read+0x220/0x220 [ 2563.613762][T11917] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2563.618703][T11917] ? vfs_write+0x9af/0x1050 [ 2563.623044][T11917] ? vmacache_update+0xb7/0x120 [ 2563.627818][T11917] kernel_clone+0x22d/0x990 [ 2563.632243][T11917] ? file_end_write+0x1b0/0x1b0 [ 2563.637210][T11917] ? __kasan_check_write+0x14/0x20 [ 2563.642135][T11917] ? create_io_thread+0x1e0/0x1e0 [ 2563.647000][T11917] ? __mutex_lock_slowpath+0x10/0x10 [ 2563.652223][T11917] __x64_sys_clone+0x289/0x310 [ 2563.656898][T11917] ? __do_sys_vfork+0x130/0x130 [ 2563.661586][T11917] ? debug_smp_processor_id+0x17/0x20 [ 2563.666789][T11917] do_syscall_64+0x44/0xd0 [ 2563.671054][T11917] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2563.676767][T11917] RIP: 0033:0x7fd2e6d030d9 [ 2563.681024][T11917] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2563.700464][T11917] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2563.708706][T11917] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2563.716621][T11917] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2563.724419][T11917] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2563.732313][T11917] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2563.740227][T11917] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2563.748035][T11917] 04:06:44 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 12) 04:06:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x6800}, 0x80) 04:06:44 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe2010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:44 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x7, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:44 executing program 1: syz_clone(0x1248000, 0x0, 0x5000, 0x0, 0x0, 0x0) 04:06:44 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x102000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:44 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe2020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x6c00}, 0x80) 04:06:44 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x8, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:44 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe2030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:44 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x9, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:44 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe2040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2563.883855][T11955] FAULT_INJECTION: forcing a failure. [ 2563.883855][T11955] name failslab, interval 1, probability 0, space 0, times 0 [ 2563.940986][T11955] CPU: 0 PID: 11955 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2563.951072][T11955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2563.960959][T11955] Call Trace: [ 2563.964083][T11955] [ 2563.966860][T11955] dump_stack_lvl+0x151/0x1b7 [ 2563.971375][T11955] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2563.976667][T11955] dump_stack+0x15/0x17 [ 2563.980660][T11955] should_fail+0x3c0/0x510 [ 2563.984916][T11955] ? mm_init+0x392/0x960 [ 2563.988993][T11955] __should_failslab+0x9f/0xe0 [ 2563.993593][T11955] should_failslab+0x9/0x20 [ 2563.997931][T11955] kmem_cache_alloc_trace+0x4a/0x310 [ 2564.003053][T11955] mm_init+0x392/0x960 [ 2564.006958][T11955] dup_mm+0x7d/0x330 [ 2564.010693][T11955] copy_mm+0x108/0x1b0 [ 2564.014592][T11955] copy_process+0x1295/0x3250 [ 2564.019109][T11955] ? proc_fail_nth_write+0x213/0x290 [ 2564.024319][T11955] ? proc_fail_nth_read+0x220/0x220 [ 2564.029354][T11955] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2564.034299][T11955] ? vfs_write+0x9af/0x1050 [ 2564.038645][T11955] ? vmacache_update+0xb7/0x120 [ 2564.043333][T11955] kernel_clone+0x22d/0x990 [ 2564.047662][T11955] ? file_end_write+0x1b0/0x1b0 [ 2564.052349][T11955] ? __kasan_check_write+0x14/0x20 [ 2564.057296][T11955] ? create_io_thread+0x1e0/0x1e0 [ 2564.062159][T11955] ? __mutex_lock_slowpath+0x10/0x10 [ 2564.067279][T11955] __x64_sys_clone+0x289/0x310 [ 2564.071879][T11955] ? __do_sys_vfork+0x130/0x130 [ 2564.076742][T11955] ? debug_smp_processor_id+0x17/0x20 [ 2564.082220][T11955] do_syscall_64+0x44/0xd0 [ 2564.086481][T11955] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2564.092550][T11955] RIP: 0033:0x7fd2e6d030d9 [ 2564.096788][T11955] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2564.116495][T11955] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2564.124839][T11955] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2564.133073][T11955] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2564.140878][T11955] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2564.148688][T11955] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2564.156499][T11955] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2564.164329][T11955] 04:06:44 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 13) 04:06:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x7400}, 0x80) 04:06:44 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0xa, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:44 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x107000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:44 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe3000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:44 executing program 1: syz_clone(0x1248000, 0x0, 0x10fff, 0x0, 0x0, 0x0) 04:06:44 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe3010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:44 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0xb, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x7a00}, 0x80) 04:06:44 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe3020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2564.233666][T11975] FAULT_INJECTION: forcing a failure. [ 2564.233666][T11975] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2564.263285][T11975] CPU: 1 PID: 11975 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2564.273355][T11975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2564.283255][T11975] Call Trace: [ 2564.286375][T11975] [ 2564.289153][T11975] dump_stack_lvl+0x151/0x1b7 [ 2564.293684][T11975] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2564.298959][T11975] ? pcpu_block_update_hint_alloc+0x972/0xd00 [ 2564.304871][T11975] dump_stack+0x15/0x17 [ 2564.308882][T11975] should_fail+0x3c0/0x510 [ 2564.313106][T11975] should_fail_alloc_page+0x58/0x70 [ 2564.318139][T11975] __alloc_pages+0x1de/0x7c0 [ 2564.322565][T11975] ? __count_vm_events+0x30/0x30 [ 2564.327361][T11975] __get_free_pages+0xe/0x30 [ 2564.331769][T11975] pgd_alloc+0x22/0x2c0 [ 2564.335758][T11975] mm_init+0x5bf/0x960 [ 2564.339663][T11975] dup_mm+0x7d/0x330 [ 2564.343407][T11975] copy_mm+0x108/0x1b0 [ 2564.347299][T11975] copy_process+0x1295/0x3250 [ 2564.351819][T11975] ? proc_fail_nth_write+0x213/0x290 [ 2564.356937][T11975] ? proc_fail_nth_read+0x220/0x220 [ 2564.362059][T11975] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2564.367003][T11975] ? vfs_write+0x9af/0x1050 [ 2564.371516][T11975] ? vmacache_update+0xb7/0x120 [ 2564.376211][T11975] kernel_clone+0x22d/0x990 04:06:44 executing program 1: syz_clone(0x1248000, 0x0, 0x20010, 0x0, 0x0, 0x0) 04:06:44 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0xc, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2564.380543][T11975] ? file_end_write+0x1b0/0x1b0 [ 2564.385235][T11975] ? __kasan_check_write+0x14/0x20 [ 2564.390284][T11975] ? create_io_thread+0x1e0/0x1e0 [ 2564.395355][T11975] ? __mutex_lock_slowpath+0x10/0x10 [ 2564.400476][T11975] __x64_sys_clone+0x289/0x310 [ 2564.405074][T11975] ? __do_sys_vfork+0x130/0x130 [ 2564.409851][T11975] ? debug_smp_processor_id+0x17/0x20 [ 2564.415259][T11975] do_syscall_64+0x44/0xd0 [ 2564.419482][T11975] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2564.425209][T11975] RIP: 0033:0x7fd2e6d030d9 [ 2564.429465][T11975] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2564.448913][T11975] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2564.457235][T11975] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2564.465047][T11975] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2564.472860][T11975] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2564.480669][T11975] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2564.488579][T11975] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2564.496703][T11975] 04:06:44 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 14) 04:06:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x9903}, 0x80) 04:06:44 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x201000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:44 executing program 1: syz_clone(0x1248000, 0x0, 0x20200, 0x0, 0x0, 0x0) 04:06:44 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe3030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:44 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0xd, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:44 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe3040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xcc03}, 0x80) 04:06:44 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0xe, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xf400}, 0x80) 04:06:44 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe4000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:44 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0xf, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2564.613857][T12002] FAULT_INJECTION: forcing a failure. [ 2564.613857][T12002] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2564.645297][T12002] CPU: 1 PID: 12002 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2564.655369][T12002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2564.665624][T12002] Call Trace: [ 2564.668734][T12002] [ 2564.671514][T12002] dump_stack_lvl+0x151/0x1b7 [ 2564.676025][T12002] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2564.681324][T12002] dump_stack+0x15/0x17 [ 2564.685312][T12002] should_fail+0x3c0/0x510 [ 2564.689743][T12002] should_fail_alloc_page+0x58/0x70 [ 2564.694860][T12002] __alloc_pages+0x1de/0x7c0 [ 2564.699413][T12002] ? __count_vm_events+0x30/0x30 [ 2564.704147][T12002] ? __kasan_kmalloc+0x9/0x10 [ 2564.708662][T12002] ? __kmalloc+0x203/0x350 [ 2564.712924][T12002] ? __vmalloc_node_range+0x2e3/0x800 [ 2564.718120][T12002] __vmalloc_node_range+0x48f/0x800 [ 2564.723157][T12002] dup_task_struct+0x61f/0xa60 [ 2564.727755][T12002] ? copy_process+0x579/0x3250 [ 2564.732357][T12002] ? __kasan_check_write+0x14/0x20 [ 2564.737303][T12002] copy_process+0x579/0x3250 [ 2564.741728][T12002] ? __kasan_check_write+0x14/0x20 [ 2564.746675][T12002] ? proc_fail_nth_write+0x213/0x290 [ 2564.751800][T12002] ? proc_fail_nth_read+0x220/0x220 [ 2564.756846][T12002] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2564.761779][T12002] ? vfs_write+0x9af/0x1050 [ 2564.766117][T12002] ? vmacache_update+0xb7/0x120 [ 2564.770813][T12002] kernel_clone+0x22d/0x990 [ 2564.775143][T12002] ? file_end_write+0x1b0/0x1b0 [ 2564.779842][T12002] ? __kasan_check_write+0x14/0x20 [ 2564.784812][T12002] ? create_io_thread+0x1e0/0x1e0 [ 2564.789640][T12002] ? __mutex_lock_slowpath+0x10/0x10 [ 2564.794777][T12002] __x64_sys_clone+0x289/0x310 [ 2564.799367][T12002] ? __do_sys_vfork+0x130/0x130 [ 2564.804048][T12002] ? debug_smp_processor_id+0x17/0x20 [ 2564.809254][T12002] do_syscall_64+0x44/0xd0 [ 2564.813505][T12002] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2564.819230][T12002] RIP: 0033:0x7fd2e6d030d9 [ 2564.823490][T12002] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2564.843041][T12002] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2564.851271][T12002] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 04:06:45 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 15) 04:06:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xff00}, 0x80) 04:06:45 executing program 1: syz_clone(0x1248000, 0x0, 0x80000, 0x0, 0x0, 0x0) 04:06:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x10, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:45 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x500000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe4010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe4020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2564.859081][T12002] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2564.867074][T12002] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2564.874882][T12002] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2564.882692][T12002] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2564.890506][T12002] 04:06:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x30000}, 0x80) 04:06:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x11, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x12, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe4030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x13, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2564.967841][T12032] FAULT_INJECTION: forcing a failure. [ 2564.967841][T12032] name failslab, interval 1, probability 0, space 0, times 0 [ 2564.996966][T12032] CPU: 1 PID: 12032 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2565.007046][T12032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2565.017027][T12032] Call Trace: [ 2565.020146][T12032] [ 2565.023104][T12032] dump_stack_lvl+0x151/0x1b7 [ 2565.027623][T12032] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2565.032905][T12032] dump_stack+0x15/0x17 [ 2565.036901][T12032] should_fail+0x3c0/0x510 [ 2565.041151][T12032] __should_failslab+0x9f/0xe0 [ 2565.045753][T12032] should_failslab+0x9/0x20 [ 2565.050095][T12032] kmem_cache_alloc+0x4f/0x2f0 [ 2565.054691][T12032] ? vm_area_dup+0x26/0x1d0 [ 2565.059027][T12032] ? __kasan_check_read+0x11/0x20 [ 2565.063891][T12032] vm_area_dup+0x26/0x1d0 [ 2565.068058][T12032] dup_mmap+0x6b8/0xea0 [ 2565.072050][T12032] ? __delayed_free_task+0x20/0x20 [ 2565.076995][T12032] ? mm_init+0x807/0x960 [ 2565.081780][T12032] dup_mm+0x91/0x330 [ 2565.085515][T12032] copy_mm+0x108/0x1b0 [ 2565.089460][T12032] copy_process+0x1295/0x3250 [ 2565.093931][T12032] ? proc_fail_nth_write+0x213/0x290 [ 2565.099049][T12032] ? proc_fail_nth_read+0x220/0x220 [ 2565.104074][T12032] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2565.109026][T12032] ? vfs_write+0x9af/0x1050 [ 2565.113364][T12032] ? vmacache_update+0xb7/0x120 [ 2565.118051][T12032] kernel_clone+0x22d/0x990 [ 2565.122388][T12032] ? file_end_write+0x1b0/0x1b0 [ 2565.127423][T12032] ? __kasan_check_write+0x14/0x20 [ 2565.132367][T12032] ? create_io_thread+0x1e0/0x1e0 [ 2565.137233][T12032] ? __mutex_lock_slowpath+0x10/0x10 [ 2565.142437][T12032] __x64_sys_clone+0x289/0x310 [ 2565.147036][T12032] ? __do_sys_vfork+0x130/0x130 [ 2565.151822][T12032] ? debug_smp_processor_id+0x17/0x20 [ 2565.157094][T12032] do_syscall_64+0x44/0xd0 [ 2565.161271][T12032] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2565.166997][T12032] RIP: 0033:0x7fd2e6d030d9 [ 2565.171253][T12032] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2565.191041][T12032] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2565.199286][T12032] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2565.207181][T12032] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 04:06:45 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 16) 04:06:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x1ac5c9}, 0x80) 04:06:45 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x701000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe4040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x14, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:45 executing program 1: syz_clone(0x1248000, 0x0, 0x101000, 0x0, 0x0, 0x0) [ 2565.214995][T12032] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2565.224200][T12032] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2565.232015][T12032] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2565.239828][T12032] 04:06:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe5000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x200000}, 0x80) 04:06:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x15, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x1000000}, 0x80) 04:06:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe5010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x16, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2565.324072][T12058] FAULT_INJECTION: forcing a failure. [ 2565.324072][T12058] name failslab, interval 1, probability 0, space 0, times 0 [ 2565.368756][T12058] CPU: 1 PID: 12058 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2565.378850][T12058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2565.388743][T12058] Call Trace: [ 2565.391866][T12058] [ 2565.394659][T12058] dump_stack_lvl+0x151/0x1b7 [ 2565.399156][T12058] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2565.404539][T12058] dump_stack+0x15/0x17 [ 2565.408530][T12058] should_fail+0x3c0/0x510 [ 2565.412785][T12058] __should_failslab+0x9f/0xe0 [ 2565.417383][T12058] should_failslab+0x9/0x20 [ 2565.421718][T12058] kmem_cache_alloc+0x4f/0x2f0 [ 2565.426336][T12058] ? vm_area_dup+0x26/0x1d0 [ 2565.430662][T12058] vm_area_dup+0x26/0x1d0 [ 2565.434927][T12058] dup_mmap+0x6b8/0xea0 [ 2565.438906][T12058] ? __delayed_free_task+0x20/0x20 [ 2565.443850][T12058] ? mm_init+0x807/0x960 [ 2565.447948][T12058] dup_mm+0x91/0x330 [ 2565.451662][T12058] copy_mm+0x108/0x1b0 [ 2565.455584][T12058] copy_process+0x1295/0x3250 [ 2565.460087][T12058] ? proc_fail_nth_write+0x213/0x290 [ 2565.465219][T12058] ? proc_fail_nth_read+0x220/0x220 [ 2565.470240][T12058] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2565.475187][T12058] ? vfs_write+0x9af/0x1050 [ 2565.479522][T12058] ? vmacache_update+0xb7/0x120 [ 2565.484307][T12058] kernel_clone+0x22d/0x990 [ 2565.488640][T12058] ? file_end_write+0x1b0/0x1b0 [ 2565.493323][T12058] ? __kasan_check_write+0x14/0x20 [ 2565.498285][T12058] ? create_io_thread+0x1e0/0x1e0 [ 2565.503140][T12058] ? __mutex_lock_slowpath+0x10/0x10 [ 2565.508254][T12058] __x64_sys_clone+0x289/0x310 [ 2565.512851][T12058] ? __do_sys_vfork+0x130/0x130 [ 2565.518148][T12058] ? debug_smp_processor_id+0x17/0x20 [ 2565.523447][T12058] do_syscall_64+0x44/0xd0 [ 2565.527701][T12058] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2565.533429][T12058] RIP: 0033:0x7fd2e6d030d9 [ 2565.537682][T12058] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2565.557219][T12058] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 04:06:45 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 17) 04:06:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x1010000}, 0x80) 04:06:45 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x1000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x17, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe5020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:45 executing program 1: syz_clone(0x1248000, 0x0, 0x500000, 0x0, 0x0, 0x0) [ 2565.565547][T12058] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2565.573360][T12058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2565.581169][T12058] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2565.588979][T12058] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2565.596872][T12058] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2565.604688][T12058] 04:06:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe5030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:45 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x2000000}, 0x80) 04:06:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x18, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe5040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe6000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:45 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x1010000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2565.644669][T12076] FAULT_INJECTION: forcing a failure. [ 2565.644669][T12076] name failslab, interval 1, probability 0, space 0, times 0 [ 2565.704962][T12076] CPU: 0 PID: 12076 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2565.715139][T12076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2565.725117][T12076] Call Trace: [ 2565.728238][T12076] [ 2565.731017][T12076] dump_stack_lvl+0x151/0x1b7 [ 2565.735531][T12076] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2565.740827][T12076] dump_stack+0x15/0x17 [ 2565.744819][T12076] should_fail+0x3c0/0x510 [ 2565.749067][T12076] ? security_prepare_creds+0x50/0x160 [ 2565.754362][T12076] __should_failslab+0x9f/0xe0 [ 2565.758966][T12076] should_failslab+0x9/0x20 [ 2565.763310][T12076] __kmalloc+0x6d/0x350 [ 2565.767296][T12076] security_prepare_creds+0x50/0x160 [ 2565.772422][T12076] prepare_creds+0x471/0x690 [ 2565.776948][T12076] copy_creds+0xde/0x640 [ 2565.781018][T12076] copy_process+0x775/0x3250 [ 2565.785443][T12076] ? __kasan_check_write+0x14/0x20 [ 2565.790562][T12076] ? proc_fail_nth_write+0x213/0x290 [ 2565.795685][T12076] ? proc_fail_nth_read+0x220/0x220 [ 2565.800718][T12076] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2565.805667][T12076] ? vfs_write+0x9af/0x1050 [ 2565.810004][T12076] ? vmacache_update+0xb7/0x120 [ 2565.814693][T12076] kernel_clone+0x22d/0x990 [ 2565.819289][T12076] ? file_end_write+0x1b0/0x1b0 [ 2565.823984][T12076] ? __kasan_check_write+0x14/0x20 [ 2565.829015][T12076] ? create_io_thread+0x1e0/0x1e0 [ 2565.834047][T12076] ? __mutex_lock_slowpath+0x10/0x10 [ 2565.839169][T12076] __x64_sys_clone+0x289/0x310 [ 2565.843768][T12076] ? __do_sys_vfork+0x130/0x130 [ 2565.848463][T12076] ? debug_smp_processor_id+0x17/0x20 [ 2565.853759][T12076] do_syscall_64+0x44/0xd0 [ 2565.858135][T12076] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2565.863839][T12076] RIP: 0033:0x7fd2e6d030d9 [ 2565.868087][T12076] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2565.887789][T12076] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2565.896034][T12076] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 04:06:46 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 18) 04:06:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x3000000}, 0x80) 04:06:46 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x2000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:46 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe6010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:46 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x19, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2565.903845][T12076] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2565.911655][T12076] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2565.919569][T12076] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2565.927365][T12076] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2565.935182][T12076] 04:06:46 executing program 1: syz_clone(0x1248000, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0) 04:06:46 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe6020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x4000000}, 0x80) 04:06:46 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x1a, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:46 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe6030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:46 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x1b, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x5000000}, 0x80) [ 2565.968642][T12101] FAULT_INJECTION: forcing a failure. [ 2565.968642][T12101] name failslab, interval 1, probability 0, space 0, times 0 [ 2566.021575][T12101] CPU: 1 PID: 12101 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2566.031671][T12101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2566.041565][T12101] Call Trace: [ 2566.044691][T12101] [ 2566.047467][T12101] dump_stack_lvl+0x151/0x1b7 [ 2566.051991][T12101] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2566.057284][T12101] dump_stack+0x15/0x17 [ 2566.061282][T12101] should_fail+0x3c0/0x510 [ 2566.065613][T12101] __should_failslab+0x9f/0xe0 [ 2566.070318][T12101] should_failslab+0x9/0x20 [ 2566.074810][T12101] kmem_cache_alloc+0x4f/0x2f0 [ 2566.079521][T12101] ? vm_area_dup+0x26/0x1d0 [ 2566.083846][T12101] ? __kasan_check_read+0x11/0x20 [ 2566.088961][T12101] vm_area_dup+0x26/0x1d0 [ 2566.093133][T12101] dup_mmap+0x6b8/0xea0 [ 2566.097122][T12101] ? __delayed_free_task+0x20/0x20 [ 2566.102068][T12101] ? mm_init+0x807/0x960 [ 2566.106146][T12101] dup_mm+0x91/0x330 [ 2566.109885][T12101] copy_mm+0x108/0x1b0 [ 2566.113793][T12101] copy_process+0x1295/0x3250 [ 2566.118306][T12101] ? proc_fail_nth_write+0x213/0x290 [ 2566.123512][T12101] ? proc_fail_nth_read+0x220/0x220 [ 2566.128551][T12101] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2566.133580][T12101] ? vfs_write+0x9af/0x1050 [ 2566.137921][T12101] ? vmacache_update+0xb7/0x120 [ 2566.142610][T12101] kernel_clone+0x22d/0x990 [ 2566.146945][T12101] ? file_end_write+0x1b0/0x1b0 [ 2566.151630][T12101] ? __kasan_check_write+0x14/0x20 [ 2566.156837][T12101] ? create_io_thread+0x1e0/0x1e0 [ 2566.161702][T12101] ? __mutex_lock_slowpath+0x10/0x10 [ 2566.166830][T12101] __x64_sys_clone+0x289/0x310 [ 2566.171415][T12101] ? __do_sys_vfork+0x130/0x130 [ 2566.176106][T12101] ? debug_smp_processor_id+0x17/0x20 [ 2566.181320][T12101] do_syscall_64+0x44/0xd0 [ 2566.185649][T12101] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2566.191379][T12101] RIP: 0033:0x7fd2e6d030d9 [ 2566.195639][T12101] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:06:46 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 19) 04:06:46 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe6040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:46 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x1c, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x6000000}, 0x80) 04:06:46 executing program 1: syz_clone(0x1248000, 0x0, 0x1000000, 0x0, 0x0, 0x0) 04:06:46 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x4000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:46 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x1d, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2566.215422][T12101] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2566.223662][T12101] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2566.231823][T12101] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2566.239634][T12101] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2566.247562][T12101] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2566.255377][T12101] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2566.263706][T12101] 04:06:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x7000000}, 0x80) 04:06:46 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe7000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x8000000}, 0x80) 04:06:46 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe7010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x9000000}, 0x80) [ 2566.318309][T12131] FAULT_INJECTION: forcing a failure. [ 2566.318309][T12131] name failslab, interval 1, probability 0, space 0, times 0 [ 2566.350598][T12131] CPU: 1 PID: 12131 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2566.360674][T12131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2566.370571][T12131] Call Trace: [ 2566.373696][T12131] [ 2566.376487][T12131] dump_stack_lvl+0x151/0x1b7 [ 2566.380987][T12131] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2566.386477][T12131] ? do_syscall_64+0x44/0xd0 [ 2566.390888][T12131] dump_stack+0x15/0x17 [ 2566.394960][T12131] should_fail+0x3c0/0x510 [ 2566.399233][T12131] __should_failslab+0x9f/0xe0 [ 2566.403837][T12131] should_failslab+0x9/0x20 [ 2566.408239][T12131] kmem_cache_alloc+0x4f/0x2f0 [ 2566.412839][T12131] ? anon_vma_clone+0xa1/0x4f0 [ 2566.417441][T12131] anon_vma_clone+0xa1/0x4f0 [ 2566.421868][T12131] anon_vma_fork+0x91/0x4f0 [ 2566.426205][T12131] ? anon_vma_name+0x4c/0x70 [ 2566.430631][T12131] dup_mmap+0x750/0xea0 [ 2566.434624][T12131] ? __delayed_free_task+0x20/0x20 [ 2566.439658][T12131] ? mm_init+0x807/0x960 [ 2566.443735][T12131] dup_mm+0x91/0x330 [ 2566.447557][T12131] copy_mm+0x108/0x1b0 [ 2566.451548][T12131] copy_process+0x1295/0x3250 [ 2566.456080][T12131] ? proc_fail_nth_write+0x213/0x290 [ 2566.461212][T12131] ? proc_fail_nth_read+0x220/0x220 [ 2566.466225][T12131] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2566.471162][T12131] ? vfs_write+0x9af/0x1050 [ 2566.475673][T12131] ? vmacache_update+0xb7/0x120 [ 2566.480363][T12131] kernel_clone+0x22d/0x990 [ 2566.484755][T12131] ? file_end_write+0x1b0/0x1b0 [ 2566.489387][T12131] ? __kasan_check_write+0x14/0x20 [ 2566.497043][T12131] ? create_io_thread+0x1e0/0x1e0 [ 2566.501891][T12131] ? __mutex_lock_slowpath+0x10/0x10 [ 2566.507023][T12131] __x64_sys_clone+0x289/0x310 [ 2566.511608][T12131] ? __do_sys_vfork+0x130/0x130 [ 2566.516294][T12131] ? debug_smp_processor_id+0x17/0x20 [ 2566.521592][T12131] do_syscall_64+0x44/0xd0 [ 2566.525852][T12131] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2566.531800][T12131] RIP: 0033:0x7fd2e6d030d9 [ 2566.536010][T12131] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2566.555451][T12131] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 04:06:46 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 20) 04:06:46 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x1e, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:46 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x5000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:46 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe7020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xa000000}, 0x80) 04:06:46 executing program 1: syz_clone(0x1248000, 0x0, 0x2000000, 0x0, 0x0, 0x0) 04:06:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xb000000}, 0x80) 04:06:46 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe7030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:46 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x21, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2566.563691][T12131] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2566.571712][T12131] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2566.579520][T12131] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2566.587298][T12131] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2566.595113][T12131] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2566.602928][T12131] 04:06:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xc000000}, 0x80) 04:06:46 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe7040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:46 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x22, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2566.650306][T12158] FAULT_INJECTION: forcing a failure. [ 2566.650306][T12158] name failslab, interval 1, probability 0, space 0, times 0 [ 2566.678724][T12158] CPU: 1 PID: 12158 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2566.688815][T12158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2566.698699][T12158] Call Trace: [ 2566.701818][T12158] [ 2566.704598][T12158] dump_stack_lvl+0x151/0x1b7 [ 2566.709111][T12158] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2566.714936][T12158] dump_stack+0x15/0x17 [ 2566.718918][T12158] should_fail+0x3c0/0x510 [ 2566.723173][T12158] ? kvmalloc_node+0x82/0x130 [ 2566.727776][T12158] __should_failslab+0x9f/0xe0 [ 2566.732373][T12158] should_failslab+0x9/0x20 [ 2566.736713][T12158] __kmalloc+0x6d/0x350 [ 2566.740715][T12158] ? kvmalloc_node+0x82/0x130 [ 2566.745305][T12158] kvmalloc_node+0x82/0x130 [ 2566.749653][T12158] alloc_fdtable+0x173/0x2b0 [ 2566.754257][T12158] dup_fd+0x781/0xa40 [ 2566.758070][T12158] ? avc_has_perm+0x16d/0x260 [ 2566.762586][T12158] copy_files+0xe6/0x200 [ 2566.766660][T12158] ? perf_event_attrs+0x30/0x30 [ 2566.771352][T12158] ? dup_task_struct+0xa60/0xa60 [ 2566.776127][T12158] ? security_task_alloc+0x132/0x150 [ 2566.781341][T12158] copy_process+0x11e9/0x3250 [ 2566.785852][T12158] ? proc_fail_nth_write+0x213/0x290 [ 2566.790974][T12158] ? proc_fail_nth_read+0x220/0x220 [ 2566.796099][T12158] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2566.801050][T12158] ? vfs_write+0x9af/0x1050 [ 2566.805398][T12158] ? vmacache_update+0xb7/0x120 [ 2566.810077][T12158] kernel_clone+0x22d/0x990 [ 2566.814411][T12158] ? file_end_write+0x1b0/0x1b0 [ 2566.819190][T12158] ? __kasan_check_write+0x14/0x20 [ 2566.824136][T12158] ? create_io_thread+0x1e0/0x1e0 [ 2566.829000][T12158] ? __mutex_lock_slowpath+0x10/0x10 [ 2566.834129][T12158] __x64_sys_clone+0x289/0x310 [ 2566.838726][T12158] ? __do_sys_vfork+0x130/0x130 [ 2566.843412][T12158] ? debug_smp_processor_id+0x17/0x20 [ 2566.848632][T12158] do_syscall_64+0x44/0xd0 [ 2566.852869][T12158] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2566.858590][T12158] RIP: 0033:0x7fd2e6d030d9 [ 2566.862844][T12158] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2566.882735][T12158] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2566.890973][T12158] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 04:06:47 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 21) 04:06:47 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x7000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:47 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe8000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:47 executing program 1: syz_clone(0x1248000, 0x0, 0x7000000, 0x0, 0x0, 0x0) 04:06:47 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xd000000}, 0x80) 04:06:47 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x23, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:47 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x25, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2566.898796][T12158] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2566.906588][T12158] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2566.914402][T12158] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2566.922481][T12158] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2566.930376][T12158] 04:06:47 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x2, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:47 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe8010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:47 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xe000000}, 0x80) 04:06:47 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x10000000}, 0x80) [ 2566.971047][T12181] FAULT_INJECTION: forcing a failure. [ 2566.971047][T12181] name failslab, interval 1, probability 0, space 0, times 0 04:06:47 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe8020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2567.061554][T12181] CPU: 0 PID: 12181 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2567.071726][T12181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2567.081619][T12181] Call Trace: [ 2567.084754][T12181] [ 2567.087537][T12181] dump_stack_lvl+0x151/0x1b7 [ 2567.092044][T12181] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2567.097330][T12181] dump_stack+0x15/0x17 [ 2567.101318][T12181] should_fail+0x3c0/0x510 [ 2567.105571][T12181] __should_failslab+0x9f/0xe0 [ 2567.110256][T12181] should_failslab+0x9/0x20 [ 2567.114715][T12181] kmem_cache_alloc+0x4f/0x2f0 [ 2567.119290][T12181] ? anon_vma_clone+0xa1/0x4f0 [ 2567.123902][T12181] anon_vma_clone+0xa1/0x4f0 [ 2567.128319][T12181] anon_vma_fork+0x91/0x4f0 [ 2567.132659][T12181] ? anon_vma_name+0x4c/0x70 [ 2567.137072][T12181] dup_mmap+0x750/0xea0 [ 2567.141069][T12181] ? __delayed_free_task+0x20/0x20 [ 2567.146013][T12181] ? mm_init+0x807/0x960 [ 2567.150542][T12181] dup_mm+0x91/0x330 [ 2567.154258][T12181] copy_mm+0x108/0x1b0 [ 2567.158251][T12181] copy_process+0x1295/0x3250 [ 2567.162762][T12181] ? proc_fail_nth_write+0x213/0x290 [ 2567.167885][T12181] ? proc_fail_nth_read+0x220/0x220 [ 2567.173006][T12181] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2567.177949][T12181] ? vfs_write+0x9af/0x1050 [ 2567.182290][T12181] ? vmacache_update+0xb7/0x120 [ 2567.186979][T12181] kernel_clone+0x22d/0x990 [ 2567.191574][T12181] ? file_end_write+0x1b0/0x1b0 [ 2567.196265][T12181] ? __kasan_check_write+0x14/0x20 [ 2567.201223][T12181] ? create_io_thread+0x1e0/0x1e0 [ 2567.206071][T12181] ? __mutex_lock_slowpath+0x10/0x10 [ 2567.211196][T12181] __x64_sys_clone+0x289/0x310 [ 2567.215794][T12181] ? __do_sys_vfork+0x130/0x130 [ 2567.220494][T12181] ? debug_smp_processor_id+0x17/0x20 [ 2567.225688][T12181] do_syscall_64+0x44/0xd0 [ 2567.230034][T12181] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2567.235839][T12181] RIP: 0033:0x7fd2e6d030d9 [ 2567.240097][T12181] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2567.259623][T12181] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2567.267865][T12181] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2567.275851][T12181] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2567.284098][T12181] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2567.292002][T12181] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2567.299895][T12181] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2567.307725][T12181] 04:06:47 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 22) 04:06:47 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x8000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:47 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x11000000}, 0x80) 04:06:47 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe8030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:47 executing program 1: syz_clone(0x1248000, 0x0, 0x8000000, 0x0, 0x0, 0x0) 04:06:47 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x3, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:47 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe8040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:47 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x12000000}, 0x80) 04:06:47 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe9000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:47 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x18000000}, 0x80) [ 2567.612291][T12208] FAULT_INJECTION: forcing a failure. [ 2567.612291][T12208] name failslab, interval 1, probability 0, space 0, times 0 04:06:47 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe9010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:47 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x10000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2567.713335][T12208] CPU: 0 PID: 12208 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2567.723592][T12208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2567.734448][T12208] Call Trace: [ 2567.737617][T12208] [ 2567.740355][T12208] dump_stack_lvl+0x151/0x1b7 [ 2567.744872][T12208] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2567.750157][T12208] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2567.756400][T12208] dump_stack+0x15/0x17 [ 2567.760384][T12208] should_fail+0x3c0/0x510 [ 2567.764737][T12208] __should_failslab+0x9f/0xe0 [ 2567.769322][T12208] should_failslab+0x9/0x20 [ 2567.774529][T12208] kmem_cache_alloc+0x4f/0x2f0 [ 2567.779130][T12208] ? anon_vma_fork+0xf7/0x4f0 [ 2567.783646][T12208] anon_vma_fork+0xf7/0x4f0 [ 2567.787981][T12208] ? anon_vma_name+0x4c/0x70 [ 2567.792416][T12208] dup_mmap+0x750/0xea0 [ 2567.796408][T12208] ? __delayed_free_task+0x20/0x20 [ 2567.801364][T12208] ? mm_init+0x807/0x960 [ 2567.805519][T12208] dup_mm+0x91/0x330 [ 2567.809252][T12208] copy_mm+0x108/0x1b0 [ 2567.813154][T12208] copy_process+0x1295/0x3250 [ 2567.817668][T12208] ? proc_fail_nth_write+0x213/0x290 [ 2567.822786][T12208] ? proc_fail_nth_read+0x220/0x220 [ 2567.827833][T12208] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2567.832775][T12208] ? vfs_write+0x9af/0x1050 [ 2567.837116][T12208] ? vmacache_update+0xb7/0x120 [ 2567.841885][T12208] kernel_clone+0x22d/0x990 [ 2567.846408][T12208] ? file_end_write+0x1b0/0x1b0 [ 2567.851085][T12208] ? __kasan_check_write+0x14/0x20 [ 2567.856134][T12208] ? create_io_thread+0x1e0/0x1e0 [ 2567.860978][T12208] ? __mutex_lock_slowpath+0x10/0x10 [ 2567.866109][T12208] __x64_sys_clone+0x289/0x310 [ 2567.870922][T12208] ? __do_sys_vfork+0x130/0x130 [ 2567.875583][T12208] ? debug_smp_processor_id+0x17/0x20 [ 2567.880941][T12208] do_syscall_64+0x44/0xd0 [ 2567.885290][T12208] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2567.891105][T12208] RIP: 0033:0x7fd2e6d030d9 [ 2567.895360][T12208] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2567.915190][T12208] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2567.923412][T12208] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2567.931227][T12208] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2567.939022][T12208] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2567.946836][T12208] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2567.954647][T12208] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2567.962561][T12208] 04:06:48 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 23) 04:06:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x20000000}, 0x80) 04:06:48 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe9020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:48 executing program 1: syz_clone(0x1248000, 0x0, 0x9000000, 0x0, 0x0, 0x0) 04:06:48 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x11000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:48 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x4, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:48 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe9030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x25000000}, 0x80) [ 2568.077262][T12227] FAULT_INJECTION: forcing a failure. [ 2568.077262][T12227] name failslab, interval 1, probability 0, space 0, times 0 [ 2568.100550][T12227] CPU: 0 PID: 12227 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2568.110627][T12227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2568.120523][T12227] Call Trace: [ 2568.123652][T12227] [ 2568.126419][T12227] dump_stack_lvl+0x151/0x1b7 [ 2568.130948][T12227] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2568.136243][T12227] dump_stack+0x15/0x17 [ 2568.140224][T12227] should_fail+0x3c0/0x510 [ 2568.144479][T12227] __should_failslab+0x9f/0xe0 [ 2568.149100][T12227] should_failslab+0x9/0x20 [ 2568.153503][T12227] kmem_cache_alloc+0x4f/0x2f0 [ 2568.158194][T12227] ? copy_sighand+0x54/0x250 [ 2568.162620][T12227] ? _raw_spin_unlock+0x4d/0x70 [ 2568.167305][T12227] copy_sighand+0x54/0x250 [ 2568.171652][T12227] copy_process+0x123f/0x3250 [ 2568.176166][T12227] ? proc_fail_nth_write+0x213/0x290 [ 2568.181290][T12227] ? proc_fail_nth_read+0x220/0x220 [ 2568.186421][T12227] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2568.191355][T12227] ? vfs_write+0x9af/0x1050 [ 2568.195694][T12227] ? vmacache_update+0xb7/0x120 [ 2568.200382][T12227] kernel_clone+0x22d/0x990 [ 2568.204719][T12227] ? file_end_write+0x1b0/0x1b0 [ 2568.209412][T12227] ? __kasan_check_write+0x14/0x20 [ 2568.214353][T12227] ? create_io_thread+0x1e0/0x1e0 [ 2568.219211][T12227] ? __mutex_lock_slowpath+0x10/0x10 [ 2568.224334][T12227] __x64_sys_clone+0x289/0x310 [ 2568.228936][T12227] ? __do_sys_vfork+0x130/0x130 [ 2568.233636][T12227] ? debug_smp_processor_id+0x17/0x20 [ 2568.238829][T12227] do_syscall_64+0x44/0xd0 [ 2568.243079][T12227] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2568.248893][T12227] RIP: 0033:0x7fd2e6d030d9 [ 2568.253154][T12227] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:06:48 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe9040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:48 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x20000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x41000000}, 0x80) [ 2568.272761][T12227] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2568.281102][T12227] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2568.288910][T12227] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2568.296724][T12227] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2568.304874][T12227] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2568.312700][T12227] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2568.320494][T12227] 04:06:48 executing program 1: syz_clone(0x1248000, 0x0, 0x10000200, 0x0, 0x0, 0x0) 04:06:48 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 24) 04:06:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x48000000}, 0x80) 04:06:48 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xea000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:48 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x40000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:48 executing program 1: syz_clone(0x1248000, 0x0, 0x11000000, 0x0, 0x0, 0x0) 04:06:48 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x5, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:48 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xea010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x4c000000}, 0x80) 04:06:48 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xea020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x64000000}, 0x80) [ 2568.501271][T12258] FAULT_INJECTION: forcing a failure. [ 2568.501271][T12258] name failslab, interval 1, probability 0, space 0, times 0 [ 2568.531208][T12258] CPU: 1 PID: 12258 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2568.541316][T12258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 04:06:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x68000000}, 0x80) 04:06:48 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xea030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2568.551200][T12258] Call Trace: [ 2568.554320][T12258] [ 2568.557174][T12258] dump_stack_lvl+0x151/0x1b7 [ 2568.561684][T12258] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2568.567067][T12258] dump_stack+0x15/0x17 [ 2568.571060][T12258] should_fail+0x3c0/0x510 [ 2568.575313][T12258] __should_failslab+0x9f/0xe0 [ 2568.579912][T12258] should_failslab+0x9/0x20 [ 2568.584251][T12258] kmem_cache_alloc+0x4f/0x2f0 [ 2568.588854][T12258] ? dup_mm+0x29/0x330 [ 2568.592758][T12258] dup_mm+0x29/0x330 [ 2568.596491][T12258] copy_mm+0x108/0x1b0 [ 2568.600396][T12258] copy_process+0x1295/0x3250 [ 2568.604908][T12258] ? proc_fail_nth_write+0x213/0x290 [ 2568.610031][T12258] ? proc_fail_nth_read+0x220/0x220 [ 2568.615086][T12258] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2568.620005][T12258] ? vfs_write+0x9af/0x1050 [ 2568.624349][T12258] ? vmacache_update+0xb7/0x120 [ 2568.629039][T12258] kernel_clone+0x22d/0x990 [ 2568.633388][T12258] ? file_end_write+0x1b0/0x1b0 [ 2568.638076][T12258] ? __kasan_check_write+0x14/0x20 [ 2568.643009][T12258] ? create_io_thread+0x1e0/0x1e0 [ 2568.647872][T12258] ? __mutex_lock_slowpath+0x10/0x10 [ 2568.653005][T12258] __x64_sys_clone+0x289/0x310 [ 2568.657603][T12258] ? __do_sys_vfork+0x130/0x130 [ 2568.662278][T12258] ? debug_smp_processor_id+0x17/0x20 [ 2568.667489][T12258] do_syscall_64+0x44/0xd0 [ 2568.671834][T12258] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2568.677637][T12258] RIP: 0033:0x7fd2e6d030d9 [ 2568.681979][T12258] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2568.701591][T12258] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2568.710025][T12258] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2568.717919][T12258] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2568.725818][T12258] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2568.733718][T12258] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2568.742133][T12258] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2568.749949][T12258] 04:06:49 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 25) 04:06:49 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x6c000000}, 0x80) 04:06:49 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xea040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:49 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x4c000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:49 executing program 1: syz_clone(0x1248000, 0x0, 0x1f000000, 0x0, 0x0, 0x0) 04:06:49 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x7, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:49 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xeb000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:49 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x74000000}, 0x80) 04:06:49 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x59020000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:49 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xeb010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:49 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x7a000000}, 0x80) 04:06:49 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xeb020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2568.862222][T12284] FAULT_INJECTION: forcing a failure. [ 2568.862222][T12284] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2568.923948][T12284] CPU: 0 PID: 12284 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2568.934031][T12284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2568.943938][T12284] Call Trace: [ 2568.947056][T12284] [ 2568.949824][T12284] dump_stack_lvl+0x151/0x1b7 [ 2568.954341][T12284] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2568.959639][T12284] ? __kasan_check_write+0x14/0x20 [ 2568.964583][T12284] ? __set_page_owner+0x2ee/0x310 [ 2568.969444][T12284] dump_stack+0x15/0x17 [ 2568.973439][T12284] should_fail+0x3c0/0x510 [ 2568.977687][T12284] should_fail_alloc_page+0x58/0x70 [ 2568.982725][T12284] __alloc_pages+0x1de/0x7c0 [ 2568.987148][T12284] ? __count_vm_events+0x30/0x30 [ 2568.991923][T12284] ? __count_vm_events+0x30/0x30 [ 2568.996691][T12284] ? __kasan_check_write+0x14/0x20 [ 2569.001640][T12284] ? _raw_spin_lock+0xa3/0x1b0 [ 2569.006260][T12284] __pmd_alloc+0xb1/0x550 [ 2569.010405][T12284] ? kmem_cache_alloc+0x189/0x2f0 [ 2569.015281][T12284] ? anon_vma_fork+0x1b9/0x4f0 [ 2569.019862][T12284] ? __pud_alloc+0x260/0x260 [ 2569.024293][T12284] ? __pud_alloc+0x218/0x260 [ 2569.028806][T12284] ? do_handle_mm_fault+0x2370/0x2370 [ 2569.034028][T12284] copy_page_range+0xd04/0x1090 [ 2569.038741][T12284] ? pfn_valid+0x1e0/0x1e0 [ 2569.042962][T12284] dup_mmap+0x99f/0xea0 [ 2569.046947][T12284] ? __delayed_free_task+0x20/0x20 [ 2569.051995][T12284] ? mm_init+0x807/0x960 [ 2569.056069][T12284] dup_mm+0x91/0x330 [ 2569.059821][T12284] copy_mm+0x108/0x1b0 [ 2569.063706][T12284] copy_process+0x1295/0x3250 [ 2569.068218][T12284] ? proc_fail_nth_write+0x213/0x290 [ 2569.073332][T12284] ? proc_fail_nth_read+0x220/0x220 [ 2569.078369][T12284] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2569.083312][T12284] ? vfs_write+0x9af/0x1050 [ 2569.087654][T12284] ? vmacache_update+0xb7/0x120 [ 2569.092349][T12284] kernel_clone+0x22d/0x990 [ 2569.096686][T12284] ? file_end_write+0x1b0/0x1b0 [ 2569.101366][T12284] ? __kasan_check_write+0x14/0x20 [ 2569.106400][T12284] ? create_io_thread+0x1e0/0x1e0 [ 2569.111262][T12284] ? __mutex_lock_slowpath+0x10/0x10 [ 2569.116390][T12284] __x64_sys_clone+0x289/0x310 [ 2569.120983][T12284] ? __do_sys_vfork+0x130/0x130 [ 2569.125814][T12284] ? debug_smp_processor_id+0x17/0x20 [ 2569.131068][T12284] do_syscall_64+0x44/0xd0 [ 2569.135248][T12284] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2569.140985][T12284] RIP: 0033:0x7fd2e6d030d9 [ 2569.145494][T12284] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2569.165018][T12284] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2569.173273][T12284] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2569.181307][T12284] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2569.189079][T12284] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2569.196876][T12284] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2569.204784][T12284] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2569.212758][T12284] 04:06:49 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 26) 04:06:49 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x99030000}, 0x80) 04:06:49 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x71000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:49 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xeb030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:49 executing program 1: syz_clone(0x1248000, 0x0, 0x1ffff000, 0x0, 0x0, 0x0) [ 2569.309171][T12309] FAULT_INJECTION: forcing a failure. [ 2569.309171][T12309] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2569.338804][T12309] CPU: 1 PID: 12309 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2569.348978][T12309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2569.358864][T12309] Call Trace: [ 2569.362339][T12309] [ 2569.365109][T12309] dump_stack_lvl+0x151/0x1b7 [ 2569.369623][T12309] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2569.375220][T12309] dump_stack+0x15/0x17 [ 2569.379199][T12309] should_fail+0x3c0/0x510 [ 2569.383445][T12309] should_fail_alloc_page+0x58/0x70 [ 2569.388473][T12309] __alloc_pages+0x1de/0x7c0 [ 2569.392896][T12309] ? __count_vm_events+0x30/0x30 [ 2569.397676][T12309] ? dup_mm+0x91/0x330 [ 2569.401667][T12309] ? copy_mm+0x108/0x1b0 [ 2569.405759][T12309] ? copy_process+0x1295/0x3250 [ 2569.410439][T12309] ? kernel_clone+0x22d/0x990 [ 2569.415044][T12309] ? __x64_sys_clone+0x289/0x310 [ 2569.420068][T12309] pte_alloc_one+0x73/0x1b0 [ 2569.424428][T12309] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2569.429451][T12309] ? __kasan_check_write+0x14/0x20 [ 2569.434396][T12309] ? __set_page_owner+0x2ee/0x310 [ 2569.439287][T12309] __pte_alloc+0x86/0x350 [ 2569.447884][T12309] ? post_alloc_hook+0x1ab/0x1b0 [ 2569.452641][T12309] ? free_pgtables+0x210/0x210 [ 2569.457256][T12309] ? get_page_from_freelist+0x38b/0x400 [ 2569.462802][T12309] copy_pte_range+0x1b1f/0x20b0 [ 2569.467762][T12309] ? __kunmap_atomic+0x80/0x80 [ 2569.472357][T12309] ? __pud_alloc+0x260/0x260 [ 2569.477131][T12309] ? __pud_alloc+0x218/0x260 [ 2569.481556][T12309] ? do_handle_mm_fault+0x2370/0x2370 [ 2569.486770][T12309] copy_page_range+0xc1e/0x1090 [ 2569.491463][T12309] ? pfn_valid+0x1e0/0x1e0 [ 2569.495793][T12309] dup_mmap+0x99f/0xea0 [ 2569.499784][T12309] ? __delayed_free_task+0x20/0x20 [ 2569.504730][T12309] ? mm_init+0x807/0x960 [ 2569.508810][T12309] dup_mm+0x91/0x330 [ 2569.512542][T12309] copy_mm+0x108/0x1b0 [ 2569.516446][T12309] copy_process+0x1295/0x3250 [ 2569.520961][T12309] ? proc_fail_nth_write+0x213/0x290 [ 2569.526092][T12309] ? proc_fail_nth_read+0x220/0x220 [ 2569.531204][T12309] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2569.536155][T12309] ? vfs_write+0x9af/0x1050 [ 2569.540489][T12309] ? vmacache_update+0xb7/0x120 [ 2569.545184][T12309] kernel_clone+0x22d/0x990 [ 2569.549519][T12309] ? file_end_write+0x1b0/0x1b0 [ 2569.554212][T12309] ? __kasan_check_write+0x14/0x20 [ 2569.559149][T12309] ? create_io_thread+0x1e0/0x1e0 [ 2569.564008][T12309] ? __mutex_lock_slowpath+0x10/0x10 [ 2569.569131][T12309] __x64_sys_clone+0x289/0x310 [ 2569.573735][T12309] ? __do_sys_vfork+0x130/0x130 [ 2569.578416][T12309] ? debug_smp_processor_id+0x17/0x20 [ 2569.583623][T12309] do_syscall_64+0x44/0xd0 [ 2569.587875][T12309] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2569.594037][T12309] RIP: 0033:0x7fd2e6d030d9 [ 2569.598299][T12309] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2569.617742][T12309] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2569.625988][T12309] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2569.633878][T12309] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2569.641708][T12309] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2569.649497][T12309] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2569.657343][T12309] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2569.665126][T12309] 04:06:50 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x8, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xc9c51a00}, 0x80) 04:06:50 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xeb040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:50 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x7d020000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:50 executing program 1: syz_clone(0x1248000, 0x0, 0x20000000, 0x0, 0x0, 0x0) 04:06:50 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 27) 04:06:50 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xec000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xcc030000}, 0x80) 04:06:50 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x9, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:50 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xec010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xf4000000}, 0x80) 04:06:50 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0xa, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:50 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0xc5030000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0xff000000}, 0x80) [ 2569.884171][T12319] FAULT_INJECTION: forcing a failure. [ 2569.884171][T12319] name failslab, interval 1, probability 0, space 0, times 0 [ 2569.953643][T12319] CPU: 0 PID: 12319 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2569.963823][T12319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2569.973901][T12319] Call Trace: [ 2569.977026][T12319] [ 2569.979799][T12319] dump_stack_lvl+0x151/0x1b7 [ 2569.984312][T12319] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2569.989609][T12319] dump_stack+0x15/0x17 [ 2569.993598][T12319] should_fail+0x3c0/0x510 [ 2569.997858][T12319] __should_failslab+0x9f/0xe0 [ 2570.002456][T12319] should_failslab+0x9/0x20 [ 2570.006793][T12319] kmem_cache_alloc+0x4f/0x2f0 [ 2570.011393][T12319] ? vm_area_dup+0x26/0x1d0 [ 2570.015734][T12319] vm_area_dup+0x26/0x1d0 [ 2570.019900][T12319] dup_mmap+0x6b8/0xea0 [ 2570.023899][T12319] ? __delayed_free_task+0x20/0x20 [ 2570.028839][T12319] ? mm_init+0x807/0x960 [ 2570.032923][T12319] dup_mm+0x91/0x330 [ 2570.036656][T12319] copy_mm+0x108/0x1b0 [ 2570.040554][T12319] copy_process+0x1295/0x3250 [ 2570.045074][T12319] ? proc_fail_nth_write+0x213/0x290 [ 2570.050189][T12319] ? proc_fail_nth_read+0x220/0x220 [ 2570.055235][T12319] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2570.060171][T12319] ? vfs_write+0x9af/0x1050 [ 2570.064512][T12319] ? vmacache_update+0xb7/0x120 [ 2570.069295][T12319] kernel_clone+0x22d/0x990 [ 2570.073632][T12319] ? file_end_write+0x1b0/0x1b0 [ 2570.078321][T12319] ? __kasan_check_write+0x14/0x20 [ 2570.083268][T12319] ? create_io_thread+0x1e0/0x1e0 [ 2570.088131][T12319] ? __mutex_lock_slowpath+0x10/0x10 [ 2570.093252][T12319] __x64_sys_clone+0x289/0x310 [ 2570.097852][T12319] ? __do_sys_vfork+0x130/0x130 [ 2570.102762][T12319] ? debug_smp_processor_id+0x17/0x20 [ 2570.107926][T12319] do_syscall_64+0x44/0xd0 [ 2570.112178][T12319] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2570.118275][T12319] RIP: 0033:0x7fd2e6d030d9 [ 2570.122527][T12319] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2570.141952][T12319] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 04:06:50 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0xcc030000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:50 executing program 1: syz_clone(0x1248000, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) 04:06:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2570.150212][T12319] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2570.158008][T12319] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2570.165924][T12319] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2570.173955][T12319] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2570.181704][T12319] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2570.189527][T12319] 04:06:50 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 28) 04:06:50 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xec020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x2}, 0x80) 04:06:50 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:50 executing program 1: syz_clone(0x1248000, 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 04:06:50 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0xb, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:50 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xec030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x3}, 0x80) 04:06:50 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xec040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:50 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x4}, 0x80) 04:06:50 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xed000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2570.431280][T12364] FAULT_INJECTION: forcing a failure. [ 2570.431280][T12364] name failslab, interval 1, probability 0, space 0, times 0 [ 2570.465827][T12364] CPU: 0 PID: 12364 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2570.475998][T12364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2570.485892][T12364] Call Trace: [ 2570.489031][T12364] [ 2570.491790][T12364] dump_stack_lvl+0x151/0x1b7 [ 2570.496305][T12364] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2570.501607][T12364] dump_stack+0x15/0x17 [ 2570.505592][T12364] should_fail+0x3c0/0x510 [ 2570.510113][T12364] __should_failslab+0x9f/0xe0 [ 2570.514803][T12364] should_failslab+0x9/0x20 [ 2570.519144][T12364] kmem_cache_alloc+0x4f/0x2f0 [ 2570.523731][T12364] ? vm_area_dup+0x26/0x1d0 [ 2570.528072][T12364] vm_area_dup+0x26/0x1d0 [ 2570.532411][T12364] dup_mmap+0x6b8/0xea0 [ 2570.536406][T12364] ? __delayed_free_task+0x20/0x20 [ 2570.541355][T12364] ? mm_init+0x807/0x960 [ 2570.545428][T12364] dup_mm+0x91/0x330 [ 2570.549171][T12364] copy_mm+0x108/0x1b0 [ 2570.553068][T12364] copy_process+0x1295/0x3250 [ 2570.557581][T12364] ? proc_fail_nth_write+0x213/0x290 [ 2570.562710][T12364] ? proc_fail_nth_read+0x220/0x220 [ 2570.567735][T12364] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2570.572682][T12364] ? vfs_write+0x9af/0x1050 [ 2570.577023][T12364] ? vmacache_update+0xb7/0x120 [ 2570.581709][T12364] kernel_clone+0x22d/0x990 [ 2570.586046][T12364] ? file_end_write+0x1b0/0x1b0 [ 2570.590830][T12364] ? __kasan_check_write+0x14/0x20 [ 2570.595772][T12364] ? create_io_thread+0x1e0/0x1e0 [ 2570.600632][T12364] ? __mutex_lock_slowpath+0x10/0x10 [ 2570.605936][T12364] __x64_sys_clone+0x289/0x310 [ 2570.610521][T12364] ? __do_sys_vfork+0x130/0x130 [ 2570.615205][T12364] ? debug_smp_processor_id+0x17/0x20 [ 2570.620412][T12364] do_syscall_64+0x44/0xd0 [ 2570.624673][T12364] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2570.630739][T12364] RIP: 0033:0x7fd2e6d030d9 [ 2570.634994][T12364] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2570.654432][T12364] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2570.662679][T12364] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2570.670494][T12364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 04:06:50 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 29) 04:06:50 executing program 1: syz_clone(0x1248000, 0x0, 0xff0f0100, 0x0, 0x0, 0x0) 04:06:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x5}, 0x80) 04:06:50 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:50 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xed010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2570.678309][T12364] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2570.686115][T12364] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2570.694368][T12364] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2570.702172][T12364] [ 2570.762444][T12382] FAULT_INJECTION: forcing a failure. [ 2570.762444][T12382] name failslab, interval 1, probability 0, space 0, times 0 [ 2570.779442][T12382] CPU: 0 PID: 12382 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2570.789750][T12382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2570.799647][T12382] Call Trace: [ 2570.802769][T12382] [ 2570.805544][T12382] dump_stack_lvl+0x151/0x1b7 [ 2570.810061][T12382] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2570.815356][T12382] ? do_syscall_64+0x44/0xd0 [ 2570.819785][T12382] dump_stack+0x15/0x17 [ 2570.823776][T12382] should_fail+0x3c0/0x510 [ 2570.828029][T12382] __should_failslab+0x9f/0xe0 [ 2570.832625][T12382] should_failslab+0x9/0x20 [ 2570.836966][T12382] kmem_cache_alloc+0x4f/0x2f0 [ 2570.841564][T12382] ? anon_vma_clone+0xa1/0x4f0 [ 2570.846177][T12382] anon_vma_clone+0xa1/0x4f0 [ 2570.850618][T12382] anon_vma_fork+0x91/0x4f0 [ 2570.854932][T12382] ? anon_vma_name+0x4c/0x70 [ 2570.859449][T12382] dup_mmap+0x750/0xea0 [ 2570.863440][T12382] ? __delayed_free_task+0x20/0x20 [ 2570.868476][T12382] ? mm_init+0x807/0x960 [ 2570.872555][T12382] dup_mm+0x91/0x330 [ 2570.876364][T12382] copy_mm+0x108/0x1b0 [ 2570.880267][T12382] copy_process+0x1295/0x3250 [ 2570.884790][T12382] ? proc_fail_nth_write+0x213/0x290 [ 2570.890080][T12382] ? proc_fail_nth_read+0x220/0x220 [ 2570.895108][T12382] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2570.900143][T12382] ? vfs_write+0x9af/0x1050 [ 2570.904486][T12382] ? vmacache_update+0xb7/0x120 [ 2570.909266][T12382] kernel_clone+0x22d/0x990 [ 2570.913770][T12382] ? file_end_write+0x1b0/0x1b0 [ 2570.918456][T12382] ? __kasan_check_write+0x14/0x20 [ 2570.923421][T12382] ? create_io_thread+0x1e0/0x1e0 [ 2570.928447][T12382] ? __mutex_lock_slowpath+0x10/0x10 [ 2570.933557][T12382] __x64_sys_clone+0x289/0x310 [ 2570.938156][T12382] ? __do_sys_vfork+0x130/0x130 [ 2570.942847][T12382] ? debug_smp_processor_id+0x17/0x20 [ 2570.948052][T12382] do_syscall_64+0x44/0xd0 [ 2570.952315][T12382] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2570.958131][T12382] RIP: 0033:0x7fd2e6d030d9 [ 2570.962383][T12382] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2570.981821][T12382] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2570.990072][T12382] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2570.998084][T12382] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2571.005869][T12382] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2571.013680][T12382] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2571.022179][T12382] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2571.030169][T12382] 04:06:51 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0xc, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x6}, 0x80) 04:06:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xed020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:51 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:51 executing program 1: syz_clone(0x1248000, 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 04:06:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x7}, 0x80) 04:06:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xed030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:51 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 30) 04:06:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xed040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x8}, 0x80) 04:06:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xee000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:51 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2571.255076][T12402] FAULT_INJECTION: forcing a failure. [ 2571.255076][T12402] name failslab, interval 1, probability 0, space 0, times 0 [ 2571.280387][T12402] CPU: 1 PID: 12402 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2571.290461][T12402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2571.300361][T12402] Call Trace: [ 2571.303478][T12402] [ 2571.306272][T12402] dump_stack_lvl+0x151/0x1b7 [ 2571.310774][T12402] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2571.316064][T12402] dump_stack+0x15/0x17 [ 2571.320066][T12402] should_fail+0x3c0/0x510 [ 2571.324314][T12402] __should_failslab+0x9f/0xe0 [ 2571.328997][T12402] should_failslab+0x9/0x20 [ 2571.333337][T12402] kmem_cache_alloc+0x4f/0x2f0 [ 2571.338031][T12402] ? vm_area_dup+0x26/0x1d0 [ 2571.342365][T12402] vm_area_dup+0x26/0x1d0 [ 2571.346530][T12402] dup_mmap+0x6b8/0xea0 [ 2571.350520][T12402] ? __delayed_free_task+0x20/0x20 [ 2571.355471][T12402] ? mm_init+0x807/0x960 [ 2571.359670][T12402] dup_mm+0x91/0x330 [ 2571.363404][T12402] copy_mm+0x108/0x1b0 [ 2571.367303][T12402] copy_process+0x1295/0x3250 [ 2571.371822][T12402] ? proc_fail_nth_write+0x213/0x290 [ 2571.376939][T12402] ? proc_fail_nth_read+0x220/0x220 [ 2571.381978][T12402] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2571.386922][T12402] ? vfs_write+0x9af/0x1050 [ 2571.391259][T12402] ? vmacache_update+0xb7/0x120 [ 2571.396046][T12402] kernel_clone+0x22d/0x990 [ 2571.400372][T12402] ? file_end_write+0x1b0/0x1b0 [ 2571.405062][T12402] ? __kasan_check_write+0x14/0x20 [ 2571.410010][T12402] ? create_io_thread+0x1e0/0x1e0 [ 2571.415831][T12402] ? __mutex_lock_slowpath+0x10/0x10 [ 2571.421090][T12402] __x64_sys_clone+0x289/0x310 [ 2571.425687][T12402] ? __do_sys_vfork+0x130/0x130 [ 2571.430370][T12402] ? debug_smp_processor_id+0x17/0x20 [ 2571.435577][T12402] do_syscall_64+0x44/0xd0 [ 2571.439921][T12402] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2571.445648][T12402] RIP: 0033:0x7fd2e6d030d9 [ 2571.449902][T12402] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2571.469417][T12402] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2571.477764][T12402] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2571.485954][T12402] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2571.493826][T12402] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2571.501703][T12402] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2571.509617][T12402] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2571.517430][T12402] 04:06:51 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0xd, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x9}, 0x80) 04:06:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xee010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:51 executing program 1: syz_clone(0x1248000, 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 04:06:51 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x7, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:51 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 31) 04:06:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xa}, 0x80) 04:06:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xee020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xee030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2571.671787][T12416] FAULT_INJECTION: forcing a failure. [ 2571.671787][T12416] name failslab, interval 1, probability 0, space 0, times 0 [ 2571.698807][T12416] CPU: 1 PID: 12416 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2571.708897][T12416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2571.718780][T12416] Call Trace: 04:06:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xee040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xef000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:52 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xef010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2571.721905][T12416] [ 2571.724694][T12416] dump_stack_lvl+0x151/0x1b7 [ 2571.729211][T12416] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2571.734491][T12416] dump_stack+0x15/0x17 [ 2571.738479][T12416] should_fail+0x3c0/0x510 [ 2571.742740][T12416] __should_failslab+0x9f/0xe0 [ 2571.747353][T12416] should_failslab+0x9/0x20 [ 2571.751696][T12416] kmem_cache_alloc+0x4f/0x2f0 [ 2571.756631][T12416] ? vm_area_dup+0x26/0x1d0 [ 2571.761755][T12416] ? __kasan_check_read+0x11/0x20 [ 2571.766625][T12416] vm_area_dup+0x26/0x1d0 [ 2571.770780][T12416] dup_mmap+0x6b8/0xea0 [ 2571.774773][T12416] ? __delayed_free_task+0x20/0x20 [ 2571.779802][T12416] ? mm_init+0x807/0x960 [ 2571.783894][T12416] dup_mm+0x91/0x330 [ 2571.787923][T12416] copy_mm+0x108/0x1b0 [ 2571.791823][T12416] copy_process+0x1295/0x3250 [ 2571.796326][T12416] ? proc_fail_nth_write+0x213/0x290 [ 2571.801617][T12416] ? proc_fail_nth_read+0x220/0x220 [ 2571.806662][T12416] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2571.811598][T12416] ? vfs_write+0x9af/0x1050 [ 2571.815937][T12416] ? vmacache_update+0xb7/0x120 [ 2571.820626][T12416] kernel_clone+0x22d/0x990 [ 2571.825012][T12416] ? file_end_write+0x1b0/0x1b0 [ 2571.829652][T12416] ? __kasan_check_write+0x14/0x20 [ 2571.834609][T12416] ? create_io_thread+0x1e0/0x1e0 [ 2571.839460][T12416] ? __mutex_lock_slowpath+0x10/0x10 [ 2571.844593][T12416] __x64_sys_clone+0x289/0x310 [ 2571.849187][T12416] ? __do_sys_vfork+0x130/0x130 [ 2571.853867][T12416] ? debug_smp_processor_id+0x17/0x20 [ 2571.859080][T12416] do_syscall_64+0x44/0xd0 [ 2571.863339][T12416] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2571.869144][T12416] RIP: 0033:0x7fd2e6d030d9 [ 2571.873405][T12416] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2571.892944][T12416] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2571.901166][T12416] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2571.908981][T12416] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2571.916787][T12416] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2571.924774][T12416] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2571.932582][T12416] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2571.940484][T12416] 04:06:52 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0xe, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xb}, 0x80) 04:06:52 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:52 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xef020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:52 executing program 1: syz_clone(0x1248000, 0x0, 0x1b0c91f000, 0x0, 0x0, 0x0) 04:06:52 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 32) 04:06:52 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xef030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xc}, 0x80) 04:06:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xd}, 0x80) 04:06:52 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xef040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2572.163221][T12448] FAULT_INJECTION: forcing a failure. [ 2572.163221][T12448] name failslab, interval 1, probability 0, space 0, times 0 [ 2572.212579][T12448] CPU: 0 PID: 12448 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2572.223537][T12448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2572.234341][T12448] Call Trace: [ 2572.237457][T12448] [ 2572.240236][T12448] dump_stack_lvl+0x151/0x1b7 [ 2572.244749][T12448] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2572.250051][T12448] dump_stack+0x15/0x17 [ 2572.254035][T12448] should_fail+0x3c0/0x510 [ 2572.258291][T12448] __should_failslab+0x9f/0xe0 [ 2572.262895][T12448] should_failslab+0x9/0x20 [ 2572.267230][T12448] kmem_cache_alloc+0x4f/0x2f0 [ 2572.271828][T12448] ? vm_area_dup+0x26/0x1d0 [ 2572.276178][T12448] ? __kasan_check_read+0x11/0x20 [ 2572.281042][T12448] vm_area_dup+0x26/0x1d0 [ 2572.285290][T12448] dup_mmap+0x6b8/0xea0 [ 2572.289292][T12448] ? __delayed_free_task+0x20/0x20 [ 2572.294220][T12448] ? mm_init+0x807/0x960 [ 2572.298307][T12448] dup_mm+0x91/0x330 [ 2572.302031][T12448] copy_mm+0x108/0x1b0 [ 2572.305944][T12448] copy_process+0x1295/0x3250 [ 2572.310460][T12448] ? proc_fail_nth_write+0x213/0x290 [ 2572.315572][T12448] ? proc_fail_nth_read+0x220/0x220 [ 2572.320605][T12448] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2572.325564][T12448] ? vfs_write+0x9af/0x1050 [ 2572.329895][T12448] ? vmacache_update+0xb7/0x120 [ 2572.334580][T12448] kernel_clone+0x22d/0x990 [ 2572.339006][T12448] ? file_end_write+0x1b0/0x1b0 [ 2572.343699][T12448] ? __kasan_check_write+0x14/0x20 [ 2572.348637][T12448] ? create_io_thread+0x1e0/0x1e0 [ 2572.353502][T12448] ? __mutex_lock_slowpath+0x10/0x10 [ 2572.358639][T12448] __x64_sys_clone+0x289/0x310 [ 2572.363224][T12448] ? __do_sys_vfork+0x130/0x130 [ 2572.367911][T12448] ? debug_smp_processor_id+0x17/0x20 [ 2572.373119][T12448] do_syscall_64+0x44/0xd0 [ 2572.377369][T12448] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2572.383194][T12448] RIP: 0033:0x7fd2e6d030d9 [ 2572.387560][T12448] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:06:52 executing program 1: syz_clone(0x1248000, 0x0, 0x2a8d67ec6000, 0x0, 0x0, 0x0) 04:06:52 executing program 1: syz_clone(0x1248000, 0x0, 0x553a28cbd000, 0x0, 0x0, 0x0) [ 2572.407096][T12448] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2572.415442][T12448] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2572.423249][T12448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2572.431572][T12448] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2572.439515][T12448] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2572.447317][T12448] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2572.455132][T12448] 04:06:52 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0xf, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:52 executing program 1: syz_clone(0x1248000, 0x0, 0x2001000000000, 0x0, 0x0, 0x0) 04:06:52 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:52 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf0000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:52 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 33) 04:06:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xe}, 0x80) 04:06:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x10}, 0x80) 04:06:52 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf0010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2572.686351][T12478] FAULT_INJECTION: forcing a failure. [ 2572.686351][T12478] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2572.718034][T12478] CPU: 0 PID: 12478 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2572.728113][T12478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2572.738006][T12478] Call Trace: [ 2572.741131][T12478] [ 2572.743910][T12478] dump_stack_lvl+0x151/0x1b7 [ 2572.748425][T12478] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2572.753718][T12478] ? __kasan_check_write+0x14/0x20 [ 2572.758760][T12478] ? __set_page_owner+0x2ee/0x310 [ 2572.763616][T12478] dump_stack+0x15/0x17 [ 2572.767606][T12478] should_fail+0x3c0/0x510 [ 2572.771859][T12478] should_fail_alloc_page+0x58/0x70 [ 2572.776977][T12478] __alloc_pages+0x1de/0x7c0 [ 2572.781405][T12478] ? __count_vm_events+0x30/0x30 [ 2572.786176][T12478] ? __count_vm_events+0x30/0x30 [ 2572.790955][T12478] ? __kasan_check_write+0x14/0x20 [ 2572.795895][T12478] ? _raw_spin_lock+0xa3/0x1b0 [ 2572.800496][T12478] __pmd_alloc+0xb1/0x550 [ 2572.804663][T12478] ? kmem_cache_alloc+0x189/0x2f0 [ 2572.809540][T12478] ? anon_vma_fork+0x1b9/0x4f0 [ 2572.814129][T12478] ? __pud_alloc+0x260/0x260 [ 2572.818550][T12478] ? __pud_alloc+0x218/0x260 [ 2572.823089][T12478] ? do_handle_mm_fault+0x2370/0x2370 [ 2572.828279][T12478] copy_page_range+0xd04/0x1090 04:06:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x11}, 0x80) 04:06:52 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:52 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf0020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x12}, 0x80) [ 2572.833067][T12478] ? pfn_valid+0x1e0/0x1e0 [ 2572.837312][T12478] dup_mmap+0x99f/0xea0 [ 2572.841303][T12478] ? __delayed_free_task+0x20/0x20 [ 2572.846438][T12478] ? mm_init+0x807/0x960 [ 2572.850500][T12478] dup_mm+0x91/0x330 [ 2572.854234][T12478] copy_mm+0x108/0x1b0 [ 2572.858136][T12478] copy_process+0x1295/0x3250 [ 2572.862650][T12478] ? proc_fail_nth_write+0x213/0x290 [ 2572.867774][T12478] ? proc_fail_nth_read+0x220/0x220 [ 2572.872935][T12478] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2572.877971][T12478] ? vfs_write+0x9af/0x1050 [ 2572.882479][T12478] ? vmacache_update+0xb7/0x120 [ 2572.887166][T12478] kernel_clone+0x22d/0x990 [ 2572.891505][T12478] ? file_end_write+0x1b0/0x1b0 [ 2572.896294][T12478] ? __kasan_check_write+0x14/0x20 [ 2572.901249][T12478] ? create_io_thread+0x1e0/0x1e0 [ 2572.906087][T12478] ? __mutex_lock_slowpath+0x10/0x10 [ 2572.911223][T12478] __x64_sys_clone+0x289/0x310 [ 2572.915818][T12478] ? __do_sys_vfork+0x130/0x130 [ 2572.921014][T12478] ? debug_smp_processor_id+0x17/0x20 [ 2572.926233][T12478] do_syscall_64+0x44/0xd0 [ 2572.930562][T12478] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2572.936302][T12478] RIP: 0033:0x7fd2e6d030d9 [ 2572.940541][T12478] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2572.959978][T12478] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2572.968228][T12478] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2572.976905][T12478] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2572.984719][T12478] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2572.992621][T12478] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2573.000527][T12478] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2573.008606][T12478] 04:06:53 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x10, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:53 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf0030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x4c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x18}, 0x80) 04:06:53 executing program 1: syz_clone(0x1248000, 0x0, 0x2020000000000, 0x0, 0x0, 0x0) 04:06:53 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 34) 04:06:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x25}, 0x80) 04:06:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x50, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:53 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf0040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:53 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x71, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2573.117382][T12503] FAULT_INJECTION: forcing a failure. [ 2573.117382][T12503] name failslab, interval 1, probability 0, space 0, times 0 [ 2573.149353][T12503] CPU: 0 PID: 12503 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 04:06:53 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf1010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2573.159694][T12503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2573.169599][T12503] Call Trace: [ 2573.172721][T12503] [ 2573.175512][T12503] dump_stack_lvl+0x151/0x1b7 [ 2573.180006][T12503] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2573.185381][T12503] dump_stack+0x15/0x17 [ 2573.189374][T12503] should_fail+0x3c0/0x510 [ 2573.193629][T12503] __should_failslab+0x9f/0xe0 [ 2573.198226][T12503] should_failslab+0x9/0x20 [ 2573.202675][T12503] kmem_cache_alloc+0x4f/0x2f0 [ 2573.207343][T12503] ? anon_vma_clone+0xa1/0x4f0 [ 2573.214373][T12503] anon_vma_clone+0xa1/0x4f0 [ 2573.218886][T12503] anon_vma_fork+0x91/0x4f0 [ 2573.223236][T12503] ? anon_vma_name+0x4c/0x70 [ 2573.227654][T12503] dup_mmap+0x750/0xea0 [ 2573.231644][T12503] ? __delayed_free_task+0x20/0x20 [ 2573.236593][T12503] ? mm_init+0x807/0x960 [ 2573.240677][T12503] dup_mm+0x91/0x330 [ 2573.244413][T12503] copy_mm+0x108/0x1b0 [ 2573.248483][T12503] copy_process+0x1295/0x3250 [ 2573.253011][T12503] ? proc_fail_nth_write+0x213/0x290 [ 2573.258125][T12503] ? proc_fail_nth_read+0x220/0x220 [ 2573.263322][T12503] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2573.268384][T12503] ? vfs_write+0x9af/0x1050 [ 2573.272897][T12503] ? vmacache_update+0xb7/0x120 [ 2573.277581][T12503] kernel_clone+0x22d/0x990 [ 2573.281909][T12503] ? file_end_write+0x1b0/0x1b0 [ 2573.286593][T12503] ? __kasan_check_write+0x14/0x20 [ 2573.291539][T12503] ? create_io_thread+0x1e0/0x1e0 [ 2573.296503][T12503] ? __mutex_lock_slowpath+0x10/0x10 [ 2573.301611][T12503] __x64_sys_clone+0x289/0x310 [ 2573.306213][T12503] ? __do_sys_vfork+0x130/0x130 [ 2573.310900][T12503] ? debug_smp_processor_id+0x17/0x20 [ 2573.316104][T12503] do_syscall_64+0x44/0xd0 [ 2573.320355][T12503] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2573.326171][T12503] RIP: 0033:0x7fd2e6d030d9 [ 2573.330430][T12503] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2573.349868][T12503] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2573.358109][T12503] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 04:06:53 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x11, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x259, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:53 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf1020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x41}, 0x80) [ 2573.365919][T12503] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2573.373741][T12503] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2573.381544][T12503] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2573.389356][T12503] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2573.397263][T12503] 04:06:53 executing program 1: syz_clone(0x1248000, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) 04:06:53 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 35) 04:06:53 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf1030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x27d, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x48}, 0x80) 04:06:53 executing program 1: syz_clone(0x1248000, 0x0, 0x10100000000000, 0x0, 0x0, 0x0) 04:06:53 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf1040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x300, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:53 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x12, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x4c}, 0x80) 04:06:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x3c5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:53 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf2000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:53 executing program 1: syz_clone(0x1248000, 0x0, 0x50000000000000, 0x0, 0x0, 0x0) [ 2573.712692][T12547] FAULT_INJECTION: forcing a failure. [ 2573.712692][T12547] name failslab, interval 1, probability 0, space 0, times 0 [ 2573.748733][T12547] CPU: 0 PID: 12547 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2573.758812][T12547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2573.768795][T12547] Call Trace: [ 2573.771915][T12547] [ 2573.774693][T12547] dump_stack_lvl+0x151/0x1b7 [ 2573.779205][T12547] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2573.784511][T12547] dump_stack+0x15/0x17 [ 2573.788579][T12547] should_fail+0x3c0/0x510 [ 2573.792834][T12547] __should_failslab+0x9f/0xe0 [ 2573.797487][T12547] should_failslab+0x9/0x20 [ 2573.801781][T12547] kmem_cache_alloc+0x4f/0x2f0 [ 2573.806381][T12547] ? vm_area_dup+0x26/0x1d0 [ 2573.810713][T12547] vm_area_dup+0x26/0x1d0 [ 2573.814877][T12547] dup_mmap+0x6b8/0xea0 [ 2573.818882][T12547] ? __delayed_free_task+0x20/0x20 [ 2573.823819][T12547] ? mm_init+0x807/0x960 [ 2573.827897][T12547] dup_mm+0x91/0x330 [ 2573.831628][T12547] copy_mm+0x108/0x1b0 [ 2573.835533][T12547] copy_process+0x1295/0x3250 [ 2573.841352][T12547] ? proc_fail_nth_write+0x213/0x290 [ 2573.846470][T12547] ? proc_fail_nth_read+0x220/0x220 [ 2573.851524][T12547] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2573.856449][T12547] ? vfs_write+0x9af/0x1050 [ 2573.860789][T12547] ? vmacache_update+0xb7/0x120 [ 2573.865480][T12547] kernel_clone+0x22d/0x990 [ 2573.869831][T12547] ? file_end_write+0x1b0/0x1b0 [ 2573.874513][T12547] ? __kasan_check_write+0x14/0x20 [ 2573.879450][T12547] ? create_io_thread+0x1e0/0x1e0 [ 2573.884312][T12547] ? __mutex_lock_slowpath+0x10/0x10 [ 2573.889433][T12547] __x64_sys_clone+0x289/0x310 [ 2573.894034][T12547] ? __do_sys_vfork+0x130/0x130 [ 2573.898726][T12547] ? debug_smp_processor_id+0x17/0x20 [ 2573.903925][T12547] do_syscall_64+0x44/0xd0 [ 2573.908181][T12547] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2573.913992][T12547] RIP: 0033:0x7fd2e6d030d9 [ 2573.918245][T12547] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2573.937687][T12547] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2573.945935][T12547] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2573.953741][T12547] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2573.961556][T12547] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2573.969368][T12547] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2573.977180][T12547] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2573.984994][T12547] 04:06:54 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36) 04:06:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf2010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x64}, 0x80) 04:06:54 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x3cc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:54 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x13, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:54 executing program 1: syz_clone(0x1248000, 0x0, 0x60ec678d2a0000, 0x0, 0x0, 0x0) 04:06:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x68}, 0x80) 04:06:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf2020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:54 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x500, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:54 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x700, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf2030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x6c}, 0x80) [ 2574.093837][T12576] FAULT_INJECTION: forcing a failure. [ 2574.093837][T12576] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2574.160755][T12576] CPU: 0 PID: 12576 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2574.170841][T12576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2574.180734][T12576] Call Trace: [ 2574.183857][T12576] [ 2574.186636][T12576] dump_stack_lvl+0x151/0x1b7 [ 2574.191148][T12576] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2574.196446][T12576] dump_stack+0x15/0x17 [ 2574.200434][T12576] should_fail+0x3c0/0x510 [ 2574.204697][T12576] should_fail_alloc_page+0x58/0x70 [ 2574.209927][T12576] __alloc_pages+0x1de/0x7c0 [ 2574.214380][T12576] ? __count_vm_events+0x30/0x30 [ 2574.219126][T12576] ? __this_cpu_preempt_check+0x13/0x20 [ 2574.224509][T12576] ? __mod_node_page_state+0xac/0xf0 [ 2574.229627][T12576] pte_alloc_one+0x73/0x1b0 [ 2574.233965][T12576] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2574.239001][T12576] __pte_alloc+0x86/0x350 [ 2574.243164][T12576] ? free_pgtables+0x210/0x210 [ 2574.247853][T12576] ? _raw_spin_lock+0xa3/0x1b0 [ 2574.252594][T12576] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2574.257879][T12576] ? __kernel_text_address+0x9a/0x110 [ 2574.263090][T12576] copy_pte_range+0x1b1f/0x20b0 [ 2574.267779][T12576] ? __kunmap_atomic+0x80/0x80 [ 2574.272373][T12576] ? __kasan_slab_alloc+0xc4/0xe0 [ 2574.277233][T12576] ? __kasan_slab_alloc+0xb2/0xe0 [ 2574.282093][T12576] ? kmem_cache_alloc+0x189/0x2f0 [ 2574.287124][T12576] ? vm_area_dup+0x26/0x1d0 [ 2574.291764][T12576] ? dup_mmap+0x6b8/0xea0 [ 2574.296040][T12576] ? dup_mm+0x91/0x330 [ 2574.299945][T12576] ? copy_mm+0x108/0x1b0 [ 2574.304019][T12576] ? copy_process+0x1295/0x3250 [ 2574.308710][T12576] ? kernel_clone+0x22d/0x990 [ 2574.313222][T12576] ? __x64_sys_clone+0x289/0x310 [ 2574.317994][T12576] ? do_syscall_64+0x44/0xd0 [ 2574.322423][T12576] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2574.328415][T12576] copy_page_range+0xc1e/0x1090 [ 2574.333107][T12576] ? pfn_valid+0x1e0/0x1e0 [ 2574.337355][T12576] dup_mmap+0x99f/0xea0 [ 2574.341341][T12576] ? __delayed_free_task+0x20/0x20 [ 2574.346288][T12576] ? mm_init+0x807/0x960 [ 2574.350369][T12576] dup_mm+0x91/0x330 [ 2574.354104][T12576] copy_mm+0x108/0x1b0 [ 2574.358268][T12576] copy_process+0x1295/0x3250 [ 2574.362779][T12576] ? proc_fail_nth_write+0x213/0x290 [ 2574.367994][T12576] ? proc_fail_nth_read+0x220/0x220 [ 2574.373024][T12576] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2574.378152][T12576] ? vfs_write+0x9af/0x1050 [ 2574.382484][T12576] ? vmacache_update+0xb7/0x120 [ 2574.387170][T12576] kernel_clone+0x22d/0x990 [ 2574.392466][T12576] ? file_end_write+0x1b0/0x1b0 [ 2574.397250][T12576] ? __kasan_check_write+0x14/0x20 [ 2574.402455][T12576] ? create_io_thread+0x1e0/0x1e0 [ 2574.407316][T12576] ? __mutex_lock_slowpath+0x10/0x10 [ 2574.412534][T12576] __x64_sys_clone+0x289/0x310 [ 2574.417309][T12576] ? __do_sys_vfork+0x130/0x130 [ 2574.421992][T12576] ? debug_smp_processor_id+0x17/0x20 [ 2574.427551][T12576] do_syscall_64+0x44/0xd0 [ 2574.431802][T12576] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2574.437532][T12576] RIP: 0033:0x7fd2e6d030d9 [ 2574.441783][T12576] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2574.461320][T12576] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2574.469603][T12576] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2574.477379][T12576] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2574.485184][T12576] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2574.493175][T12576] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2574.501071][T12576] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2574.508883][T12576] 04:06:54 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 37) 04:06:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf2040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x74}, 0x80) 04:06:54 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x1100, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:54 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x14, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:54 executing program 1: syz_clone(0x1248000, 0x0, 0xd0cb283a550000, 0x0, 0x0, 0x0) 04:06:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf3000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:54 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x2000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x7a}, 0x80) 04:06:54 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x4000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xf4}, 0x80) 04:06:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf3010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2574.612912][T12592] FAULT_INJECTION: forcing a failure. [ 2574.612912][T12592] name failslab, interval 1, probability 0, space 0, times 0 [ 2574.658391][T12592] CPU: 0 PID: 12592 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2574.668473][T12592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2574.678375][T12592] Call Trace: [ 2574.681486][T12592] [ 2574.684269][T12592] dump_stack_lvl+0x151/0x1b7 [ 2574.688779][T12592] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2574.694073][T12592] dump_stack+0x15/0x17 [ 2574.698074][T12592] should_fail+0x3c0/0x510 [ 2574.702334][T12592] __should_failslab+0x9f/0xe0 [ 2574.706929][T12592] should_failslab+0x9/0x20 [ 2574.711258][T12592] kmem_cache_alloc+0x4f/0x2f0 [ 2574.715860][T12592] ? vm_area_dup+0x26/0x1d0 [ 2574.720286][T12592] vm_area_dup+0x26/0x1d0 [ 2574.724451][T12592] dup_mmap+0x6b8/0xea0 [ 2574.728447][T12592] ? __delayed_free_task+0x20/0x20 [ 2574.733400][T12592] ? mm_init+0x807/0x960 [ 2574.737468][T12592] dup_mm+0x91/0x330 [ 2574.741224][T12592] copy_mm+0x108/0x1b0 [ 2574.745116][T12592] copy_process+0x1295/0x3250 [ 2574.749624][T12592] ? proc_fail_nth_write+0x213/0x290 [ 2574.754742][T12592] ? proc_fail_nth_read+0x220/0x220 [ 2574.759777][T12592] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2574.764720][T12592] ? vfs_write+0x9af/0x1050 [ 2574.769061][T12592] ? vmacache_update+0xb7/0x120 [ 2574.773888][T12592] kernel_clone+0x22d/0x990 [ 2574.778203][T12592] ? file_end_write+0x1b0/0x1b0 [ 2574.782890][T12592] ? __kasan_check_write+0x14/0x20 [ 2574.787835][T12592] ? create_io_thread+0x1e0/0x1e0 [ 2574.792697][T12592] ? __mutex_lock_slowpath+0x10/0x10 [ 2574.797824][T12592] __x64_sys_clone+0x289/0x310 [ 2574.802425][T12592] ? __do_sys_vfork+0x130/0x130 [ 2574.807110][T12592] ? debug_smp_processor_id+0x17/0x20 [ 2574.812312][T12592] do_syscall_64+0x44/0xd0 [ 2574.816562][T12592] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2574.822292][T12592] RIP: 0033:0x7fd2e6d030d9 [ 2574.826553][T12592] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2574.845985][T12592] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2574.854238][T12592] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2574.862043][T12592] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2574.869985][T12592] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2574.877798][T12592] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2574.885598][T12592] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2574.893411][T12592] 04:06:55 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 38) 04:06:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x300}, 0x80) 04:06:55 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x4c00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:55 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf3020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:55 executing program 1: syz_clone(0x1248000, 0x0, 0xf0910c1b000000, 0x0, 0x0, 0x0) 04:06:55 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x15, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:55 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf3030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:55 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x5000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:55 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x16, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x399}, 0x80) 04:06:55 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf3040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:55 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x5902, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2575.169596][T12618] FAULT_INJECTION: forcing a failure. [ 2575.169596][T12618] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2575.218723][T12618] CPU: 1 PID: 12618 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2575.228807][T12618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2575.238710][T12618] Call Trace: [ 2575.241824][T12618] [ 2575.244683][T12618] dump_stack_lvl+0x151/0x1b7 [ 2575.249202][T12618] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2575.254498][T12618] dump_stack+0x15/0x17 [ 2575.258485][T12618] should_fail+0x3c0/0x510 [ 2575.262746][T12618] should_fail_alloc_page+0x58/0x70 [ 2575.267948][T12618] __alloc_pages+0x1de/0x7c0 [ 2575.272374][T12618] ? __count_vm_events+0x30/0x30 [ 2575.277147][T12618] ? __this_cpu_preempt_check+0x13/0x20 [ 2575.282529][T12618] ? __mod_node_page_state+0xac/0xf0 [ 2575.287653][T12618] pte_alloc_one+0x73/0x1b0 [ 2575.291987][T12618] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2575.297023][T12618] __pte_alloc+0x86/0x350 [ 2575.301191][T12618] ? free_pgtables+0x210/0x210 [ 2575.305786][T12618] ? _raw_spin_lock+0xa3/0x1b0 [ 2575.310388][T12618] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2575.315606][T12618] ? __kernel_text_address+0x9a/0x110 [ 2575.320805][T12618] copy_pte_range+0x1b1f/0x20b0 [ 2575.325610][T12618] ? __kunmap_atomic+0x80/0x80 [ 2575.330201][T12618] ? __kasan_slab_alloc+0xc4/0xe0 [ 2575.335059][T12618] ? __kasan_slab_alloc+0xb2/0xe0 [ 2575.339919][T12618] ? kmem_cache_alloc+0x189/0x2f0 [ 2575.344780][T12618] ? vm_area_dup+0x26/0x1d0 [ 2575.349121][T12618] ? dup_mmap+0x6b8/0xea0 [ 2575.353547][T12618] ? dup_mm+0x91/0x330 [ 2575.357459][T12618] ? copy_mm+0x108/0x1b0 [ 2575.361542][T12618] ? copy_process+0x1295/0x3250 [ 2575.366315][T12618] ? kernel_clone+0x22d/0x990 [ 2575.370818][T12618] ? __x64_sys_clone+0x289/0x310 [ 2575.375596][T12618] ? do_syscall_64+0x44/0xd0 [ 2575.380020][T12618] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2575.386020][T12618] copy_page_range+0xc1e/0x1090 [ 2575.390827][T12618] ? pfn_valid+0x1e0/0x1e0 [ 2575.395146][T12618] dup_mmap+0x99f/0xea0 [ 2575.399138][T12618] ? __delayed_free_task+0x20/0x20 [ 2575.404090][T12618] ? mm_init+0x807/0x960 [ 2575.408166][T12618] dup_mm+0x91/0x330 [ 2575.411894][T12618] copy_mm+0x108/0x1b0 [ 2575.415801][T12618] copy_process+0x1295/0x3250 [ 2575.420312][T12618] ? proc_fail_nth_write+0x213/0x290 [ 2575.425432][T12618] ? proc_fail_nth_read+0x220/0x220 [ 2575.430466][T12618] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2575.435413][T12618] ? vfs_write+0x9af/0x1050 [ 2575.439754][T12618] ? vmacache_update+0xb7/0x120 [ 2575.444441][T12618] kernel_clone+0x22d/0x990 [ 2575.448791][T12618] ? file_end_write+0x1b0/0x1b0 [ 2575.453467][T12618] ? __kasan_check_write+0x14/0x20 [ 2575.458415][T12618] ? create_io_thread+0x1e0/0x1e0 [ 2575.463275][T12618] ? __mutex_lock_slowpath+0x10/0x10 [ 2575.468425][T12618] __x64_sys_clone+0x289/0x310 [ 2575.473006][T12618] ? __do_sys_vfork+0x130/0x130 [ 2575.477694][T12618] ? debug_smp_processor_id+0x17/0x20 [ 2575.482902][T12618] do_syscall_64+0x44/0xd0 [ 2575.487153][T12618] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2575.492868][T12618] RIP: 0033:0x7fd2e6d030d9 [ 2575.497126][T12618] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:06:55 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 39) 04:06:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x3cc}, 0x80) 04:06:55 executing program 1: syz_clone(0x1248000, 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0) 04:06:55 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x7100, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:55 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf4000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2575.516567][T12618] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2575.524821][T12618] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2575.532710][T12618] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2575.540524][T12618] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2575.548425][T12618] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2575.556316][T12618] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2575.564305][T12618] 04:06:55 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf4010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x500}, 0x80) 04:06:55 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x7d02, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2575.608595][T12644] FAULT_INJECTION: forcing a failure. [ 2575.608595][T12644] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2575.688486][T12644] CPU: 0 PID: 12644 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2575.698578][T12644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2575.708552][T12644] Call Trace: [ 2575.711672][T12644] [ 2575.714450][T12644] dump_stack_lvl+0x151/0x1b7 [ 2575.718963][T12644] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2575.724265][T12644] dump_stack+0x15/0x17 [ 2575.728247][T12644] should_fail+0x3c0/0x510 [ 2575.732503][T12644] should_fail_alloc_page+0x58/0x70 [ 2575.737536][T12644] __alloc_pages+0x1de/0x7c0 [ 2575.742050][T12644] ? __count_vm_events+0x30/0x30 [ 2575.746911][T12644] ? dup_mm+0x91/0x330 [ 2575.750825][T12644] ? copy_mm+0x108/0x1b0 [ 2575.754904][T12644] ? copy_process+0x1295/0x3250 [ 2575.759631][T12644] ? kernel_clone+0x22d/0x990 [ 2575.764093][T12644] ? __x64_sys_clone+0x289/0x310 [ 2575.768868][T12644] pte_alloc_one+0x73/0x1b0 [ 2575.773208][T12644] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2575.778240][T12644] ? __kasan_check_write+0x14/0x20 [ 2575.783186][T12644] ? __set_page_owner+0x2ee/0x310 [ 2575.788060][T12644] __pte_alloc+0x86/0x350 [ 2575.792215][T12644] ? post_alloc_hook+0x1ab/0x1b0 [ 2575.796997][T12644] ? free_pgtables+0x210/0x210 [ 2575.801588][T12644] ? get_page_from_freelist+0x38b/0x400 [ 2575.806987][T12644] copy_pte_range+0x1b1f/0x20b0 [ 2575.811666][T12644] ? __kunmap_atomic+0x80/0x80 [ 2575.816263][T12644] ? __pud_alloc+0x260/0x260 [ 2575.820680][T12644] ? __pud_alloc+0x218/0x260 [ 2575.825116][T12644] ? do_handle_mm_fault+0x2370/0x2370 [ 2575.830320][T12644] copy_page_range+0xc1e/0x1090 [ 2575.835008][T12644] ? pfn_valid+0x1e0/0x1e0 [ 2575.839262][T12644] dup_mmap+0x99f/0xea0 [ 2575.843336][T12644] ? __delayed_free_task+0x20/0x20 [ 2575.848281][T12644] ? mm_init+0x807/0x960 [ 2575.852368][T12644] dup_mm+0x91/0x330 [ 2575.856102][T12644] copy_mm+0x108/0x1b0 [ 2575.860173][T12644] copy_process+0x1295/0x3250 [ 2575.864773][T12644] ? proc_fail_nth_write+0x213/0x290 [ 2575.869909][T12644] ? proc_fail_nth_read+0x220/0x220 [ 2575.874926][T12644] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2575.879907][T12644] ? vfs_write+0x9af/0x1050 [ 2575.884213][T12644] ? vmacache_update+0xb7/0x120 [ 2575.888898][T12644] kernel_clone+0x22d/0x990 [ 2575.893239][T12644] ? file_end_write+0x1b0/0x1b0 [ 2575.897924][T12644] ? __kasan_check_write+0x14/0x20 [ 2575.902873][T12644] ? create_io_thread+0x1e0/0x1e0 [ 2575.907735][T12644] ? __mutex_lock_slowpath+0x10/0x10 [ 2575.912851][T12644] __x64_sys_clone+0x289/0x310 [ 2575.917455][T12644] ? __do_sys_vfork+0x130/0x130 [ 2575.922146][T12644] ? debug_smp_processor_id+0x17/0x20 [ 2575.927348][T12644] do_syscall_64+0x44/0xd0 [ 2575.931609][T12644] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2575.937334][T12644] RIP: 0033:0x7fd2e6d030d9 [ 2575.941594][T12644] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2575.961020][T12644] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2575.969268][T12644] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2575.977173][T12644] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2575.984983][T12644] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2575.992789][T12644] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2576.000602][T12644] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2576.008417][T12644] 04:06:56 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x17, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x600}, 0x80) 04:06:56 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0xc503, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:56 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf4020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:56 executing program 1: syz_clone(0x1248000, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 04:06:56 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 40) 04:06:56 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf4030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x700}, 0x80) 04:06:56 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0xcc03, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2576.106194][T12660] FAULT_INJECTION: forcing a failure. [ 2576.106194][T12660] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2576.124679][T12660] CPU: 0 PID: 12660 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2576.134759][T12660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2576.144651][T12660] Call Trace: [ 2576.147779][T12660] [ 2576.150553][T12660] dump_stack_lvl+0x151/0x1b7 [ 2576.155067][T12660] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2576.160368][T12660] dump_stack+0x15/0x17 [ 2576.164353][T12660] should_fail+0x3c0/0x510 [ 2576.168797][T12660] should_fail_alloc_page+0x58/0x70 [ 2576.173819][T12660] __alloc_pages+0x1de/0x7c0 [ 2576.178250][T12660] ? __count_vm_events+0x30/0x30 [ 2576.183048][T12660] ? dup_mm+0x91/0x330 [ 2576.186917][T12660] ? copy_mm+0x108/0x1b0 [ 2576.191015][T12660] ? copy_process+0x1295/0x3250 [ 2576.195687][T12660] ? kernel_clone+0x22d/0x990 [ 2576.200198][T12660] ? __x64_sys_clone+0x289/0x310 [ 2576.204977][T12660] pte_alloc_one+0x73/0x1b0 [ 2576.209311][T12660] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2576.214347][T12660] ? __kasan_check_write+0x14/0x20 [ 2576.219293][T12660] ? __set_page_owner+0x2ee/0x310 [ 2576.224156][T12660] __pte_alloc+0x86/0x350 [ 2576.228321][T12660] ? post_alloc_hook+0x1ab/0x1b0 [ 2576.233094][T12660] ? free_pgtables+0x210/0x210 [ 2576.237869][T12660] ? get_page_from_freelist+0x38b/0x400 [ 2576.243342][T12660] copy_pte_range+0x1b1f/0x20b0 [ 2576.248028][T12660] ? __kunmap_atomic+0x80/0x80 [ 2576.252622][T12660] ? __pud_alloc+0x260/0x260 [ 2576.257058][T12660] ? __pud_alloc+0x218/0x260 [ 2576.261573][T12660] ? do_handle_mm_fault+0x2370/0x2370 [ 2576.266770][T12660] copy_page_range+0xc1e/0x1090 [ 2576.271500][T12660] ? pfn_valid+0x1e0/0x1e0 [ 2576.275887][T12660] dup_mmap+0x99f/0xea0 [ 2576.279874][T12660] ? __delayed_free_task+0x20/0x20 [ 2576.284829][T12660] ? mm_init+0x807/0x960 [ 2576.288899][T12660] dup_mm+0x91/0x330 [ 2576.292719][T12660] copy_mm+0x108/0x1b0 [ 2576.296627][T12660] copy_process+0x1295/0x3250 [ 2576.301143][T12660] ? proc_fail_nth_write+0x213/0x290 [ 2576.306441][T12660] ? proc_fail_nth_read+0x220/0x220 [ 2576.311482][T12660] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2576.316411][T12660] ? vfs_write+0x9af/0x1050 [ 2576.320753][T12660] ? vmacache_update+0xb7/0x120 [ 2576.325447][T12660] kernel_clone+0x22d/0x990 [ 2576.329780][T12660] ? file_end_write+0x1b0/0x1b0 [ 2576.334465][T12660] ? __kasan_check_write+0x14/0x20 [ 2576.339593][T12660] ? create_io_thread+0x1e0/0x1e0 [ 2576.344454][T12660] ? __mutex_lock_slowpath+0x10/0x10 [ 2576.349570][T12660] __x64_sys_clone+0x289/0x310 04:06:56 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x18, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2576.354335][T12660] ? __do_sys_vfork+0x130/0x130 [ 2576.359012][T12660] ? debug_smp_processor_id+0x17/0x20 [ 2576.364214][T12660] do_syscall_64+0x44/0xd0 [ 2576.368555][T12660] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2576.374457][T12660] RIP: 0033:0x7fd2e6d030d9 [ 2576.378713][T12660] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2576.398144][T12660] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 04:06:56 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf4040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x900}, 0x80) 04:06:56 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x30000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2576.406476][T12660] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2576.414987][T12660] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2576.422820][T12660] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2576.430603][T12660] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2576.438669][T12660] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2576.446487][T12660] 04:06:56 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf5000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xa00}, 0x80) 04:06:56 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x70000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:56 executing program 1: syz_clone(0x1248000, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 04:06:56 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 41) 04:06:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xb00}, 0x80) 04:06:56 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x102000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:56 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf5010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2576.603011][T12694] FAULT_INJECTION: forcing a failure. [ 2576.603011][T12694] name failslab, interval 1, probability 0, space 0, times 0 [ 2576.628865][T12694] CPU: 0 PID: 12694 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2576.638946][T12694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2576.648920][T12694] Call Trace: [ 2576.652089][T12694] [ 2576.654838][T12694] dump_stack_lvl+0x151/0x1b7 [ 2576.659356][T12694] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2576.664635][T12694] dump_stack+0x15/0x17 [ 2576.668757][T12694] should_fail+0x3c0/0x510 [ 2576.673006][T12694] __should_failslab+0x9f/0xe0 [ 2576.677601][T12694] should_failslab+0x9/0x20 [ 2576.681926][T12694] kmem_cache_alloc+0x4f/0x2f0 [ 2576.686527][T12694] ? vm_area_dup+0x26/0x1d0 [ 2576.690862][T12694] ? __kasan_check_read+0x11/0x20 [ 2576.695722][T12694] vm_area_dup+0x26/0x1d0 [ 2576.699888][T12694] dup_mmap+0x6b8/0xea0 [ 2576.703883][T12694] ? __delayed_free_task+0x20/0x20 [ 2576.708835][T12694] ? mm_init+0x807/0x960 [ 2576.712905][T12694] dup_mm+0x91/0x330 [ 2576.716638][T12694] copy_mm+0x108/0x1b0 [ 2576.720545][T12694] copy_process+0x1295/0x3250 [ 2576.725065][T12694] ? proc_fail_nth_write+0x213/0x290 [ 2576.730178][T12694] ? proc_fail_nth_read+0x220/0x220 [ 2576.735222][T12694] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2576.740332][T12694] ? vfs_write+0x9af/0x1050 [ 2576.744758][T12694] ? vmacache_update+0xb7/0x120 [ 2576.749448][T12694] kernel_clone+0x22d/0x990 [ 2576.753794][T12694] ? file_end_write+0x1b0/0x1b0 [ 2576.758685][T12694] ? __kasan_check_write+0x14/0x20 [ 2576.763594][T12694] ? create_io_thread+0x1e0/0x1e0 [ 2576.768456][T12694] ? __mutex_lock_slowpath+0x10/0x10 [ 2576.773578][T12694] __x64_sys_clone+0x289/0x310 [ 2576.778175][T12694] ? __do_sys_vfork+0x130/0x130 [ 2576.782863][T12694] ? debug_smp_processor_id+0x17/0x20 [ 2576.788078][T12694] do_syscall_64+0x44/0xd0 [ 2576.792335][T12694] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2576.798054][T12694] RIP: 0033:0x7fd2e6d030d9 [ 2576.802392][T12694] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2576.821829][T12694] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2576.830104][T12694] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2576.837886][T12694] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2576.845706][T12694] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2576.853529][T12694] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2576.861325][T12694] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2576.869133][T12694] 04:06:57 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x19, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf5020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x107000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xc00}, 0x80) 04:06:57 executing program 1: syz_clone(0x1248000, 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 04:06:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x201000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf5030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x500000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:57 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 42) 04:06:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xd00}, 0x80) 04:06:57 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x1a, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf5040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x701000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:57 executing program 1: syz_clone(0x1248000, 0x0, 0x800000000000000, 0x0, 0x0, 0x0) 04:06:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x1000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xe00}, 0x80) 04:06:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf6000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf6010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2577.093624][T12724] FAULT_INJECTION: forcing a failure. [ 2577.093624][T12724] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2577.119355][T12724] CPU: 1 PID: 12724 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2577.129490][T12724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2577.139356][T12724] Call Trace: [ 2577.142481][T12724] [ 2577.145253][T12724] dump_stack_lvl+0x151/0x1b7 [ 2577.149769][T12724] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2577.155065][T12724] dump_stack+0x15/0x17 [ 2577.159054][T12724] should_fail+0x3c0/0x510 [ 2577.163309][T12724] should_fail_alloc_page+0x58/0x70 [ 2577.168345][T12724] __alloc_pages+0x1de/0x7c0 [ 2577.172779][T12724] ? __count_vm_events+0x30/0x30 [ 2577.177542][T12724] ? __this_cpu_preempt_check+0x13/0x20 [ 2577.182925][T12724] ? __mod_node_page_state+0xac/0xf0 [ 2577.188053][T12724] pte_alloc_one+0x73/0x1b0 [ 2577.192387][T12724] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2577.197420][T12724] __pte_alloc+0x86/0x350 [ 2577.201591][T12724] ? free_pgtables+0x210/0x210 [ 2577.206183][T12724] ? _raw_spin_lock+0xa3/0x1b0 [ 2577.210786][T12724] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2577.215997][T12724] ? __kernel_text_address+0x9a/0x110 [ 2577.221211][T12724] copy_pte_range+0x1b1f/0x20b0 [ 2577.225899][T12724] ? __kunmap_atomic+0x80/0x80 [ 2577.230483][T12724] ? __kasan_slab_alloc+0xc4/0xe0 [ 2577.235346][T12724] ? __kasan_slab_alloc+0xb2/0xe0 [ 2577.240209][T12724] ? kmem_cache_alloc+0x189/0x2f0 [ 2577.245072][T12724] ? vm_area_dup+0x26/0x1d0 [ 2577.249405][T12724] ? dup_mmap+0x6b8/0xea0 [ 2577.253571][T12724] ? dup_mm+0x91/0x330 [ 2577.257476][T12724] ? copy_mm+0x108/0x1b0 [ 2577.261561][T12724] ? copy_process+0x1295/0x3250 [ 2577.266241][T12724] ? kernel_clone+0x22d/0x990 [ 2577.270755][T12724] ? __x64_sys_clone+0x289/0x310 [ 2577.275616][T12724] ? do_syscall_64+0x44/0xd0 [ 2577.280052][T12724] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2577.286214][T12724] copy_page_range+0xc1e/0x1090 [ 2577.290893][T12724] ? pfn_valid+0x1e0/0x1e0 [ 2577.295157][T12724] dup_mmap+0x99f/0xea0 [ 2577.299139][T12724] ? __delayed_free_task+0x20/0x20 [ 2577.304086][T12724] ? mm_init+0x807/0x960 [ 2577.308260][T12724] dup_mm+0x91/0x330 [ 2577.312071][T12724] copy_mm+0x108/0x1b0 [ 2577.315975][T12724] copy_process+0x1295/0x3250 [ 2577.320490][T12724] ? proc_fail_nth_write+0x213/0x290 [ 2577.325717][T12724] ? proc_fail_nth_read+0x220/0x220 [ 2577.330835][T12724] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2577.335873][T12724] ? vfs_write+0x9af/0x1050 [ 2577.340218][T12724] ? vmacache_update+0xb7/0x120 [ 2577.344897][T12724] kernel_clone+0x22d/0x990 [ 2577.349339][T12724] ? file_end_write+0x1b0/0x1b0 [ 2577.354186][T12724] ? __kasan_check_write+0x14/0x20 [ 2577.359141][T12724] ? create_io_thread+0x1e0/0x1e0 [ 2577.364081][T12724] ? __mutex_lock_slowpath+0x10/0x10 [ 2577.369206][T12724] __x64_sys_clone+0x289/0x310 [ 2577.373889][T12724] ? __do_sys_vfork+0x130/0x130 [ 2577.378571][T12724] ? debug_smp_processor_id+0x17/0x20 [ 2577.383775][T12724] do_syscall_64+0x44/0xd0 [ 2577.388026][T12724] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2577.393753][T12724] RIP: 0033:0x7fd2e6d030d9 [ 2577.398033][T12724] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2577.417819][T12724] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2577.426047][T12724] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2577.433864][T12724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 04:06:57 executing program 1: syz_clone(0x1248000, 0x0, 0x900000000000000, 0x0, 0x0, 0x0) 04:06:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x1010000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2577.442096][T12724] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2577.449907][T12724] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2577.457806][T12724] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2577.465708][T12724] 04:06:57 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 43) 04:06:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x1100}, 0x80) 04:06:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf6020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:57 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x1b, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x2000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:57 executing program 1: syz_clone(0x1248000, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) 04:06:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x4000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x1200}, 0x80) 04:06:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf6030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf6040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x5000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf7000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2577.688903][T12752] FAULT_INJECTION: forcing a failure. [ 2577.688903][T12752] name failslab, interval 1, probability 0, space 0, times 0 [ 2577.703628][T12752] CPU: 1 PID: 12752 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2577.713709][T12752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2577.723596][T12752] Call Trace: [ 2577.726716][T12752] [ 2577.729497][T12752] dump_stack_lvl+0x151/0x1b7 [ 2577.734097][T12752] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2577.739481][T12752] dump_stack+0x15/0x17 [ 2577.743469][T12752] should_fail+0x3c0/0x510 [ 2577.747721][T12752] __should_failslab+0x9f/0xe0 [ 2577.752320][T12752] should_failslab+0x9/0x20 [ 2577.756672][T12752] kmem_cache_alloc+0x4f/0x2f0 [ 2577.761521][T12752] ? vm_area_dup+0x26/0x1d0 [ 2577.766050][T12752] vm_area_dup+0x26/0x1d0 [ 2577.770208][T12752] dup_mmap+0x6b8/0xea0 [ 2577.774198][T12752] ? __delayed_free_task+0x20/0x20 [ 2577.779142][T12752] ? mm_init+0x807/0x960 [ 2577.783231][T12752] dup_mm+0x91/0x330 [ 2577.786951][T12752] copy_mm+0x108/0x1b0 [ 2577.790882][T12752] copy_process+0x1295/0x3250 [ 2577.795467][T12752] ? proc_fail_nth_write+0x213/0x290 [ 2577.800614][T12752] ? proc_fail_nth_read+0x220/0x220 [ 2577.805631][T12752] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2577.810563][T12752] ? vfs_write+0x9af/0x1050 [ 2577.814899][T12752] ? vmacache_update+0xb7/0x120 [ 2577.819587][T12752] kernel_clone+0x22d/0x990 [ 2577.823925][T12752] ? file_end_write+0x1b0/0x1b0 [ 2577.828624][T12752] ? __kasan_check_write+0x14/0x20 [ 2577.833559][T12752] ? create_io_thread+0x1e0/0x1e0 [ 2577.838420][T12752] ? __mutex_lock_slowpath+0x10/0x10 [ 2577.843545][T12752] __x64_sys_clone+0x289/0x310 [ 2577.848139][T12752] ? __do_sys_vfork+0x130/0x130 [ 2577.852830][T12752] ? debug_smp_processor_id+0x17/0x20 [ 2577.858035][T12752] do_syscall_64+0x44/0xd0 [ 2577.862375][T12752] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2577.868106][T12752] RIP: 0033:0x7fd2e6d030d9 [ 2577.872529][T12752] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2577.892666][T12752] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2577.901001][T12752] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2577.908805][T12752] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2577.916666][T12752] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2577.924619][T12752] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2577.932448][T12752] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 04:06:58 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 44) 04:06:58 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x7000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:58 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf7010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:58 executing program 1: syz_clone(0x1248000, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 04:06:58 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x1c, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x1800}, 0x80) 04:06:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x2000}, 0x80) [ 2577.940232][T12752] 04:06:58 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf7020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:58 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf7030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x2500}, 0x80) 04:06:58 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x8000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x4100}, 0x80) 04:06:58 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf7040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2578.013633][T12788] FAULT_INJECTION: forcing a failure. [ 2578.013633][T12788] name failslab, interval 1, probability 0, space 0, times 0 [ 2578.043120][T12788] CPU: 0 PID: 12788 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2578.053201][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2578.063099][T12788] Call Trace: [ 2578.066217][T12788] [ 2578.068994][T12788] dump_stack_lvl+0x151/0x1b7 [ 2578.073515][T12788] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2578.078803][T12788] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2578.085053][T12788] dump_stack+0x15/0x17 [ 2578.089050][T12788] should_fail+0x3c0/0x510 [ 2578.093298][T12788] __should_failslab+0x9f/0xe0 [ 2578.097898][T12788] should_failslab+0x9/0x20 [ 2578.102237][T12788] kmem_cache_alloc+0x4f/0x2f0 [ 2578.108226][T12788] ? anon_vma_fork+0xf7/0x4f0 [ 2578.112737][T12788] anon_vma_fork+0xf7/0x4f0 [ 2578.117081][T12788] ? anon_vma_name+0x4c/0x70 [ 2578.121506][T12788] dup_mmap+0x750/0xea0 [ 2578.125496][T12788] ? __delayed_free_task+0x20/0x20 [ 2578.130443][T12788] ? mm_init+0x807/0x960 [ 2578.134537][T12788] dup_mm+0x91/0x330 [ 2578.138254][T12788] copy_mm+0x108/0x1b0 [ 2578.142164][T12788] copy_process+0x1295/0x3250 [ 2578.146678][T12788] ? proc_fail_nth_write+0x213/0x290 [ 2578.151795][T12788] ? proc_fail_nth_read+0x220/0x220 [ 2578.156832][T12788] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2578.161777][T12788] ? vfs_write+0x9af/0x1050 [ 2578.166118][T12788] ? vmacache_update+0xb7/0x120 [ 2578.170803][T12788] kernel_clone+0x22d/0x990 [ 2578.175142][T12788] ? file_end_write+0x1b0/0x1b0 [ 2578.179832][T12788] ? __kasan_check_write+0x14/0x20 [ 2578.184777][T12788] ? create_io_thread+0x1e0/0x1e0 [ 2578.189633][T12788] ? __mutex_lock_slowpath+0x10/0x10 [ 2578.194757][T12788] __x64_sys_clone+0x289/0x310 [ 2578.199356][T12788] ? __do_sys_vfork+0x130/0x130 [ 2578.204042][T12788] ? debug_smp_processor_id+0x17/0x20 [ 2578.209438][T12788] do_syscall_64+0x44/0xd0 [ 2578.213766][T12788] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2578.219581][T12788] RIP: 0033:0x7fd2e6d030d9 [ 2578.223831][T12788] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2578.243289][T12788] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2578.251518][T12788] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 04:06:58 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 45) 04:06:58 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x1d, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:58 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf8000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2578.259327][T12788] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2578.267147][T12788] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2578.274975][T12788] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2578.282773][T12788] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2578.290578][T12788] [ 2578.345999][T12799] FAULT_INJECTION: forcing a failure. [ 2578.345999][T12799] name failslab, interval 1, probability 0, space 0, times 0 [ 2578.362858][T12799] CPU: 0 PID: 12799 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2578.373547][T12799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2578.383440][T12799] Call Trace: [ 2578.386569][T12799] [ 2578.389341][T12799] dump_stack_lvl+0x151/0x1b7 [ 2578.393858][T12799] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2578.399153][T12799] dump_stack+0x15/0x17 [ 2578.403141][T12799] should_fail+0x3c0/0x510 [ 2578.407409][T12799] __should_failslab+0x9f/0xe0 [ 2578.412177][T12799] should_failslab+0x9/0x20 [ 2578.416509][T12799] kmem_cache_alloc+0x4f/0x2f0 [ 2578.421372][T12799] ? anon_vma_fork+0x1b9/0x4f0 [ 2578.426055][T12799] anon_vma_fork+0x1b9/0x4f0 [ 2578.430484][T12799] dup_mmap+0x750/0xea0 [ 2578.434477][T12799] ? __delayed_free_task+0x20/0x20 [ 2578.439422][T12799] ? mm_init+0x807/0x960 [ 2578.443587][T12799] dup_mm+0x91/0x330 [ 2578.447319][T12799] copy_mm+0x108/0x1b0 [ 2578.451231][T12799] copy_process+0x1295/0x3250 [ 2578.455742][T12799] ? proc_fail_nth_write+0x213/0x290 [ 2578.460954][T12799] ? proc_fail_nth_read+0x220/0x220 [ 2578.465982][T12799] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2578.470951][T12799] ? vfs_write+0x9af/0x1050 [ 2578.475270][T12799] ? vmacache_update+0xb7/0x120 [ 2578.479955][T12799] kernel_clone+0x22d/0x990 [ 2578.484291][T12799] ? file_end_write+0x1b0/0x1b0 [ 2578.488980][T12799] ? __kasan_check_write+0x14/0x20 [ 2578.494020][T12799] ? create_io_thread+0x1e0/0x1e0 [ 2578.498900][T12799] ? __mutex_lock_slowpath+0x10/0x10 [ 2578.504012][T12799] __x64_sys_clone+0x289/0x310 [ 2578.508711][T12799] ? __do_sys_vfork+0x130/0x130 [ 2578.513745][T12799] ? debug_smp_processor_id+0x17/0x20 [ 2578.519032][T12799] do_syscall_64+0x44/0xd0 [ 2578.523286][T12799] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2578.529305][T12799] RIP: 0033:0x7fd2e6d030d9 [ 2578.533555][T12799] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2578.553170][T12799] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2578.562121][T12799] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2578.569917][T12799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2578.577732][T12799] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2578.585626][T12799] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 04:06:58 executing program 1: syz_clone(0x1248000, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 04:06:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x4800}, 0x80) 04:06:58 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x10000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:58 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf8010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:58 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x1e, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:58 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 46) 04:06:58 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x11000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:58 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf8020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x4c00}, 0x80) [ 2578.593441][T12799] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2578.601389][T12799] 04:06:58 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf8030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2578.652372][T12814] FAULT_INJECTION: forcing a failure. [ 2578.652372][T12814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2578.669516][T12814] CPU: 0 PID: 12814 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2578.679957][T12814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2578.689860][T12814] Call Trace: [ 2578.692981][T12814] [ 2578.695752][T12814] dump_stack_lvl+0x151/0x1b7 [ 2578.700268][T12814] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2578.706104][T12814] dump_stack+0x15/0x17 [ 2578.710080][T12814] should_fail+0x3c0/0x510 [ 2578.714336][T12814] should_fail_alloc_page+0x58/0x70 [ 2578.719361][T12814] __alloc_pages+0x1de/0x7c0 [ 2578.723788][T12814] ? __count_vm_events+0x30/0x30 [ 2578.728561][T12814] ? __this_cpu_preempt_check+0x13/0x20 [ 2578.734026][T12814] ? __mod_node_page_state+0xac/0xf0 [ 2578.739149][T12814] pte_alloc_one+0x73/0x1b0 [ 2578.743486][T12814] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2578.748523][T12814] __pte_alloc+0x86/0x350 [ 2578.752688][T12814] ? free_pgtables+0x210/0x210 [ 2578.757285][T12814] ? _raw_spin_lock+0xa3/0x1b0 [ 2578.761897][T12814] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2578.767093][T12814] ? __kernel_text_address+0x9a/0x110 [ 2578.772304][T12814] copy_pte_range+0x1b1f/0x20b0 [ 2578.776996][T12814] ? __kunmap_atomic+0x80/0x80 [ 2578.781593][T12814] ? __kasan_slab_alloc+0xc4/0xe0 [ 2578.786445][T12814] ? __kasan_slab_alloc+0xb2/0xe0 [ 2578.791309][T12814] ? kmem_cache_alloc+0x189/0x2f0 [ 2578.796167][T12814] ? vm_area_dup+0x26/0x1d0 [ 2578.800595][T12814] ? dup_mmap+0x6b8/0xea0 [ 2578.804852][T12814] ? dup_mm+0x91/0x330 [ 2578.808764][T12814] ? copy_mm+0x108/0x1b0 [ 2578.812835][T12814] ? copy_process+0x1295/0x3250 [ 2578.817518][T12814] ? kernel_clone+0x22d/0x990 [ 2578.822033][T12814] ? __x64_sys_clone+0x289/0x310 [ 2578.826805][T12814] ? do_syscall_64+0x44/0xd0 [ 2578.831233][T12814] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2578.837137][T12814] copy_page_range+0xc1e/0x1090 [ 2578.841905][T12814] ? pfn_valid+0x1e0/0x1e0 [ 2578.846177][T12814] dup_mmap+0x99f/0xea0 [ 2578.850277][T12814] ? __delayed_free_task+0x20/0x20 [ 2578.855221][T12814] ? mm_init+0x807/0x960 [ 2578.859300][T12814] dup_mm+0x91/0x330 [ 2578.863030][T12814] copy_mm+0x108/0x1b0 [ 2578.866946][T12814] copy_process+0x1295/0x3250 [ 2578.871451][T12814] ? proc_fail_nth_write+0x213/0x290 [ 2578.876573][T12814] ? proc_fail_nth_read+0x220/0x220 [ 2578.881694][T12814] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2578.886636][T12814] ? vfs_write+0x9af/0x1050 [ 2578.890977][T12814] ? vmacache_update+0xb7/0x120 [ 2578.895751][T12814] kernel_clone+0x22d/0x990 [ 2578.900093][T12814] ? file_end_write+0x1b0/0x1b0 [ 2578.904776][T12814] ? __kasan_check_write+0x14/0x20 [ 2578.909727][T12814] ? create_io_thread+0x1e0/0x1e0 [ 2578.914585][T12814] ? __mutex_lock_slowpath+0x10/0x10 [ 2578.919703][T12814] __x64_sys_clone+0x289/0x310 [ 2578.924307][T12814] ? __do_sys_vfork+0x130/0x130 [ 2578.928995][T12814] ? debug_smp_processor_id+0x17/0x20 [ 2578.934214][T12814] do_syscall_64+0x44/0xd0 [ 2578.938457][T12814] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2578.944179][T12814] RIP: 0033:0x7fd2e6d030d9 [ 2578.948434][T12814] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2578.967875][T12814] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2578.976207][T12814] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2578.984015][T12814] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2578.991928][T12814] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 04:06:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x6400}, 0x80) 04:06:58 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf421e, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:59 executing program 1: syz_clone(0x1248000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 04:06:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x6800}, 0x80) 04:06:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x6c00}, 0x80) 04:06:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x7400}, 0x80) 04:06:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x7a00}, 0x80) 04:06:59 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 47) 04:06:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x9903}, 0x80) 04:06:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf8040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x20000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xcc03}, 0x80) 04:06:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x40000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2578.999738][T12814] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2579.007548][T12814] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2579.015367][T12814] [ 2579.059886][T12846] FAULT_INJECTION: forcing a failure. [ 2579.059886][T12846] name failslab, interval 1, probability 0, space 0, times 0 [ 2579.081141][T12846] CPU: 0 PID: 12846 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2579.091219][T12846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2579.101204][T12846] Call Trace: [ 2579.104364][T12846] [ 2579.107119][T12846] dump_stack_lvl+0x151/0x1b7 [ 2579.111615][T12846] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2579.116913][T12846] dump_stack+0x15/0x17 [ 2579.121000][T12846] should_fail+0x3c0/0x510 [ 2579.125243][T12846] __should_failslab+0x9f/0xe0 [ 2579.129844][T12846] should_failslab+0x9/0x20 [ 2579.134183][T12846] kmem_cache_alloc+0x4f/0x2f0 [ 2579.138780][T12846] ? vm_area_dup+0x26/0x1d0 [ 2579.143121][T12846] vm_area_dup+0x26/0x1d0 [ 2579.147287][T12846] dup_mmap+0x6b8/0xea0 [ 2579.151280][T12846] ? __delayed_free_task+0x20/0x20 [ 2579.156498][T12846] ? mm_init+0x807/0x960 [ 2579.160566][T12846] dup_mm+0x91/0x330 [ 2579.164309][T12846] copy_mm+0x108/0x1b0 [ 2579.168212][T12846] copy_process+0x1295/0x3250 [ 2579.172721][T12846] ? proc_fail_nth_write+0x213/0x290 [ 2579.177840][T12846] ? proc_fail_nth_read+0x220/0x220 [ 2579.182877][T12846] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2579.187832][T12846] ? vfs_write+0x9af/0x1050 [ 2579.192160][T12846] ? vmacache_update+0xb7/0x120 [ 2579.196855][T12846] kernel_clone+0x22d/0x990 [ 2579.201186][T12846] ? file_end_write+0x1b0/0x1b0 [ 2579.205872][T12846] ? __kasan_check_write+0x14/0x20 [ 2579.211349][T12846] ? create_io_thread+0x1e0/0x1e0 [ 2579.216207][T12846] ? __mutex_lock_slowpath+0x10/0x10 [ 2579.221339][T12846] __x64_sys_clone+0x289/0x310 [ 2579.225923][T12846] ? __do_sys_vfork+0x130/0x130 [ 2579.230707][T12846] ? debug_smp_processor_id+0x17/0x20 [ 2579.235922][T12846] do_syscall_64+0x44/0xd0 [ 2579.240185][T12846] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2579.245891][T12846] RIP: 0033:0x7fd2e6d030d9 [ 2579.250155][T12846] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2579.269761][T12846] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2579.278008][T12846] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2579.285852][T12846] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2579.293633][T12846] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2579.301472][T12846] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 04:06:59 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4241, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:59 executing program 1: syz_clone(0x1248000, 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) 04:06:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf9000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xf400}, 0x80) 04:06:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xff00}, 0x80) 04:06:59 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2579.309252][T12846] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2579.317074][T12846] 04:06:59 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 48) 04:06:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x30000}, 0x80) 04:06:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf9010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x4c000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:59 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x2}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf9020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x1ac5c9}, 0x80) [ 2579.420567][T12870] FAULT_INJECTION: forcing a failure. [ 2579.420567][T12870] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2579.456569][T12870] CPU: 0 PID: 12870 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2579.466651][T12870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2579.476559][T12870] Call Trace: [ 2579.479672][T12870] [ 2579.482481][T12870] dump_stack_lvl+0x151/0x1b7 [ 2579.486976][T12870] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2579.492255][T12870] dump_stack+0x15/0x17 [ 2579.496253][T12870] should_fail+0x3c0/0x510 [ 2579.500508][T12870] should_fail_alloc_page+0x58/0x70 [ 2579.505541][T12870] __alloc_pages+0x1de/0x7c0 [ 2579.509964][T12870] ? __count_vm_events+0x30/0x30 [ 2579.514737][T12870] ? __this_cpu_preempt_check+0x13/0x20 [ 2579.520118][T12870] ? __mod_node_page_state+0xac/0xf0 [ 2579.526495][T12870] pte_alloc_one+0x73/0x1b0 [ 2579.530791][T12870] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2579.535915][T12870] __pte_alloc+0x86/0x350 [ 2579.540089][T12870] ? free_pgtables+0x210/0x210 [ 2579.544675][T12870] ? _raw_spin_lock+0xa3/0x1b0 [ 2579.549282][T12870] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2579.554575][T12870] ? __kernel_text_address+0x9a/0x110 [ 2579.559780][T12870] copy_pte_range+0x1b1f/0x20b0 [ 2579.564472][T12870] ? __kunmap_atomic+0x80/0x80 [ 2579.569069][T12870] ? __kasan_slab_alloc+0xc4/0xe0 [ 2579.573939][T12870] ? __kasan_slab_alloc+0xb2/0xe0 [ 2579.578785][T12870] ? kmem_cache_alloc+0x189/0x2f0 [ 2579.583744][T12870] ? vm_area_dup+0x26/0x1d0 [ 2579.588072][T12870] ? dup_mmap+0x6b8/0xea0 [ 2579.592237][T12870] ? dup_mm+0x91/0x330 [ 2579.596148][T12870] ? copy_mm+0x108/0x1b0 [ 2579.600262][T12870] ? copy_process+0x1295/0x3250 [ 2579.604910][T12870] ? kernel_clone+0x22d/0x990 [ 2579.609430][T12870] ? __x64_sys_clone+0x289/0x310 [ 2579.614197][T12870] ? do_syscall_64+0x44/0xd0 [ 2579.618625][T12870] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2579.624625][T12870] copy_page_range+0xc1e/0x1090 [ 2579.629406][T12870] ? pfn_valid+0x1e0/0x1e0 [ 2579.633750][T12870] dup_mmap+0x99f/0xea0 [ 2579.637741][T12870] ? __delayed_free_task+0x20/0x20 [ 2579.642698][T12870] ? mm_init+0x807/0x960 [ 2579.646767][T12870] dup_mm+0x91/0x330 [ 2579.650495][T12870] copy_mm+0x108/0x1b0 [ 2579.654402][T12870] copy_process+0x1295/0x3250 [ 2579.659061][T12870] ? proc_fail_nth_write+0x213/0x290 [ 2579.664181][T12870] ? proc_fail_nth_read+0x220/0x220 [ 2579.669220][T12870] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2579.674164][T12870] ? vfs_write+0x9af/0x1050 [ 2579.678500][T12870] ? vmacache_update+0xb7/0x120 [ 2579.683189][T12870] kernel_clone+0x22d/0x990 [ 2579.687524][T12870] ? file_end_write+0x1b0/0x1b0 [ 2579.692217][T12870] ? __kasan_check_write+0x14/0x20 [ 2579.697163][T12870] ? create_io_thread+0x1e0/0x1e0 [ 2579.702118][T12870] ? __mutex_lock_slowpath+0x10/0x10 [ 2579.707225][T12870] __x64_sys_clone+0x289/0x310 [ 2579.711831][T12870] ? __do_sys_vfork+0x130/0x130 [ 2579.716600][T12870] ? debug_smp_processor_id+0x17/0x20 [ 2579.721907][T12870] do_syscall_64+0x44/0xd0 [ 2579.726266][T12870] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2579.732060][T12870] RIP: 0033:0x7fd2e6d030d9 [ 2579.736317][T12870] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2579.755957][T12870] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 04:06:59 executing program 1: syz_clone(0x1248000, 0x0, 0xff0f010000000000, 0x0, 0x0, 0x0) 04:06:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x59020000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:06:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf9030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:06:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x200000}, 0x80) 04:06:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf9040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:00 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 49) 04:07:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x71000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:00 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfa000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:00 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r0, 0x12) [ 2579.764374][T12870] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2579.772189][T12870] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2579.780082][T12870] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2579.787990][T12870] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2579.795798][T12870] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2579.803954][T12870] 04:07:00 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x4}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x1000000}, 0x80) 04:07:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x7d020000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:00 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfa010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:00 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r0, 0x12) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r0, 0x12) (async) 04:07:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0xc5030000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x1010000}, 0x80) 04:07:00 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfa020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2580.195762][T12916] FAULT_INJECTION: forcing a failure. [ 2580.195762][T12916] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2580.219963][T12916] CPU: 0 PID: 12916 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2580.230055][T12916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2580.241069][T12916] Call Trace: [ 2580.244189][T12916] [ 2580.247022][T12916] dump_stack_lvl+0x151/0x1b7 [ 2580.251507][T12916] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2580.257215][T12916] dump_stack+0x15/0x17 [ 2580.261819][T12916] should_fail+0x3c0/0x510 [ 2580.266072][T12916] should_fail_alloc_page+0x58/0x70 [ 2580.271118][T12916] __alloc_pages+0x1de/0x7c0 [ 2580.275804][T12916] ? __count_vm_events+0x30/0x30 [ 2580.280585][T12916] ? __this_cpu_preempt_check+0x13/0x20 [ 2580.285947][T12916] ? __mod_node_page_state+0xac/0xf0 [ 2580.291166][T12916] pte_alloc_one+0x73/0x1b0 [ 2580.295510][T12916] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2580.300538][T12916] __pte_alloc+0x86/0x350 [ 2580.304786][T12916] ? free_pgtables+0x210/0x210 [ 2580.309401][T12916] ? _raw_spin_lock+0xa3/0x1b0 [ 2580.314011][T12916] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2580.319208][T12916] ? __kernel_text_address+0x9a/0x110 [ 2580.324664][T12916] copy_pte_range+0x1b1f/0x20b0 [ 2580.329438][T12916] ? __kunmap_atomic+0x80/0x80 [ 2580.334037][T12916] ? __kasan_slab_alloc+0xc4/0xe0 [ 2580.338989][T12916] ? __kasan_slab_alloc+0xb2/0xe0 [ 2580.343862][T12916] ? kmem_cache_alloc+0x189/0x2f0 [ 2580.349017][T12916] ? vm_area_dup+0x26/0x1d0 [ 2580.353438][T12916] ? dup_mmap+0x6b8/0xea0 [ 2580.357700][T12916] ? dup_mm+0x91/0x330 [ 2580.361710][T12916] ? copy_mm+0x108/0x1b0 [ 2580.365884][T12916] ? copy_process+0x1295/0x3250 [ 2580.370549][T12916] ? kernel_clone+0x22d/0x990 [ 2580.375715][T12916] ? __x64_sys_clone+0x289/0x310 [ 2580.380637][T12916] ? do_syscall_64+0x44/0xd0 [ 2580.385034][T12916] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2580.391292][T12916] copy_page_range+0xc1e/0x1090 [ 2580.395987][T12916] ? pfn_valid+0x1e0/0x1e0 [ 2580.400226][T12916] dup_mmap+0x99f/0xea0 [ 2580.404226][T12916] ? __delayed_free_task+0x20/0x20 [ 2580.409171][T12916] ? mm_init+0x807/0x960 [ 2580.413241][T12916] dup_mm+0x91/0x330 [ 2580.416980][T12916] copy_mm+0x108/0x1b0 [ 2580.421053][T12916] copy_process+0x1295/0x3250 [ 2580.425576][T12916] ? proc_fail_nth_write+0x213/0x290 [ 2580.430692][T12916] ? proc_fail_nth_read+0x220/0x220 [ 2580.435738][T12916] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2580.440754][T12916] ? vfs_write+0x9af/0x1050 [ 2580.445100][T12916] ? vmacache_update+0xb7/0x120 [ 2580.449891][T12916] kernel_clone+0x22d/0x990 [ 2580.454216][T12916] ? file_end_write+0x1b0/0x1b0 [ 2580.459181][T12916] ? __kasan_check_write+0x14/0x20 [ 2580.464123][T12916] ? create_io_thread+0x1e0/0x1e0 [ 2580.469058][T12916] ? __mutex_lock_slowpath+0x10/0x10 [ 2580.474269][T12916] __x64_sys_clone+0x289/0x310 [ 2580.478865][T12916] ? __do_sys_vfork+0x130/0x130 [ 2580.483552][T12916] ? debug_smp_processor_id+0x17/0x20 [ 2580.488760][T12916] do_syscall_64+0x44/0xd0 [ 2580.493190][T12916] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2580.498913][T12916] RIP: 0033:0x7fd2e6d030d9 [ 2580.503166][T12916] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2580.522617][T12916] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2580.530852][T12916] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2580.538686][T12916] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 04:07:00 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 50) 04:07:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x2000000}, 0x80) 04:07:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0xcc030000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:00 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfa030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:00 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r0, 0x12) 04:07:00 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x5}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:00 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfa040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x3000000}, 0x80) [ 2580.546480][T12916] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2580.554374][T12916] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2580.562184][T12916] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2580.569998][T12916] 04:07:00 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfb000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x4000000}, 0x80) 04:07:00 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfb010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2580.629373][T12930] FAULT_INJECTION: forcing a failure. [ 2580.629373][T12930] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2580.681030][T12930] CPU: 1 PID: 12930 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2580.691290][T12930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2580.701193][T12930] Call Trace: [ 2580.704307][T12930] [ 2580.707090][T12930] dump_stack_lvl+0x151/0x1b7 [ 2580.711604][T12930] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2580.716905][T12930] dump_stack+0x15/0x17 [ 2580.720884][T12930] should_fail+0x3c0/0x510 [ 2580.725141][T12930] should_fail_alloc_page+0x58/0x70 [ 2580.730261][T12930] __alloc_pages+0x1de/0x7c0 [ 2580.734689][T12930] ? __count_vm_events+0x30/0x30 [ 2580.739475][T12930] ? __this_cpu_preempt_check+0x13/0x20 [ 2580.744840][T12930] ? __mod_node_page_state+0xac/0xf0 [ 2580.749966][T12930] pte_alloc_one+0x73/0x1b0 [ 2580.754302][T12930] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2580.759337][T12930] __pte_alloc+0x86/0x350 [ 2580.763502][T12930] ? free_pgtables+0x210/0x210 [ 2580.768104][T12930] ? _raw_spin_lock+0xa3/0x1b0 [ 2580.772701][T12930] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2580.777997][T12930] ? __kernel_text_address+0x9a/0x110 [ 2580.783384][T12930] copy_pte_range+0x1b1f/0x20b0 [ 2580.788290][T12930] ? __kunmap_atomic+0x80/0x80 [ 2580.793207][T12930] ? __kasan_slab_alloc+0xc4/0xe0 [ 2580.798019][T12930] ? __kasan_slab_alloc+0xb2/0xe0 [ 2580.802868][T12930] ? kmem_cache_alloc+0x189/0x2f0 [ 2580.807814][T12930] ? vm_area_dup+0x26/0x1d0 [ 2580.812239][T12930] ? dup_mmap+0x6b8/0xea0 [ 2580.816404][T12930] ? dup_mm+0x91/0x330 [ 2580.820310][T12930] ? copy_mm+0x108/0x1b0 [ 2580.824520][T12930] ? copy_process+0x1295/0x3250 [ 2580.829199][T12930] ? kernel_clone+0x22d/0x990 [ 2580.833798][T12930] ? __x64_sys_clone+0x289/0x310 [ 2580.838572][T12930] ? do_syscall_64+0x44/0xd0 [ 2580.843366][T12930] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2580.849352][T12930] copy_page_range+0xc1e/0x1090 [ 2580.854033][T12930] ? pfn_valid+0x1e0/0x1e0 [ 2580.858281][T12930] dup_mmap+0x99f/0xea0 [ 2580.862451][T12930] ? __delayed_free_task+0x20/0x20 [ 2580.867396][T12930] ? mm_init+0x807/0x960 [ 2580.871472][T12930] dup_mm+0x91/0x330 [ 2580.875203][T12930] copy_mm+0x108/0x1b0 [ 2580.879197][T12930] copy_process+0x1295/0x3250 [ 2580.883905][T12930] ? proc_fail_nth_write+0x213/0x290 [ 2580.889105][T12930] ? proc_fail_nth_read+0x220/0x220 [ 2580.894148][T12930] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2580.899087][T12930] ? vfs_write+0x9af/0x1050 [ 2580.903436][T12930] ? vmacache_update+0xb7/0x120 [ 2580.908204][T12930] kernel_clone+0x22d/0x990 [ 2580.912540][T12930] ? file_end_write+0x1b0/0x1b0 [ 2580.917232][T12930] ? __kasan_check_write+0x14/0x20 [ 2580.922173][T12930] ? create_io_thread+0x1e0/0x1e0 [ 2580.927035][T12930] ? __mutex_lock_slowpath+0x10/0x10 [ 2580.932168][T12930] __x64_sys_clone+0x289/0x310 [ 2580.936754][T12930] ? __do_sys_vfork+0x130/0x130 [ 2580.941622][T12930] ? debug_smp_processor_id+0x17/0x20 [ 2580.946826][T12930] do_syscall_64+0x44/0xd0 [ 2580.951249][T12930] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2580.956978][T12930] RIP: 0033:0x7fd2e6d030d9 [ 2580.961241][T12930] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2580.980678][T12930] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2580.988917][T12930] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2580.996728][T12930] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2581.004547][T12930] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2581.012350][T12930] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2581.020161][T12930] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2581.027986][T12930] 04:07:01 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 51) 04:07:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x5000000}, 0x80) 04:07:01 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x840800, &(0x7f00000000c0)="11dbb6762e0d06a4f7af909ca7b832fd23b31192067e6d3163a8dca96956b87244b50f49c029d5d5465ac16226329f50fa42709bb609b49a5ae262fc1aed524173071a99d2", 0x45, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000011c0)="3c8a31794c7c165707c5b8013733a4dda72f6f771385590221c6870a31529540fdd8fbec80b340d82d7bb0af50a175199c4760d2344af504a6a7763d6d30e34bab8d57e0b1cdbd5cacba8094928f3d3709fe870d6ae5dc84a6e6f6034459b31b50c048c9840d4d03d21d291713792fcd1cbdf6b9313c32c86567bcbe0cdde596e0b26606efa24b6c69f24a72d8e2609ba5666f2898b51dd39b4bda27c86d4aac623c1b23d7ac918cb22af1a3da8c8a6627a846660194d2cb4c525ae13b16186f6199d02c67d2e03231179dd65213db1933c3233e26daed3fed22480389556aec1fbd876f2c6950fb72314df2599921432c0c051214f8886b917d1f180fda8bbe083123e8e2e6a99361c5d87a0b8eff4569653b8f64c6e68f5e85d672d6e39634ddc669cec5a6cd16eded567b232ee2b907e897fb06de5ef806b3bedd814561aa4a2fffc86f19769c541a7f4a5924fc45fce0a41b3995421d030a31afa71c7af6cb368469f1946965823e68e678d06bfddb2a2eb81062162cc3a5417c4d8dc20a8b4ed39fe299df21ca31d91049eddefd82133aa5363335a93d2386ae0a1355612e061c50decc49b8aada30babf250a76031cb93100cc3fc7d6c1f6a6a1190bc5b7ca19fd7e4bea494fa757793b713127804ac545cbc95e15de6eb2e97524a0876d9862ede97a048476ae6008cec38928ea3da8f3bd55ddad9b88826ca1a60642a4f711246a131638bd6bd1364266ade7e5722847e3c6c9efa43d7c4ea91995a43c19f6d7361df8e3b3119769785450c79885a212371b5e3f5aa3fd9f3c4c03b8ff62aaf922397eaef3482359948bf9fb042d92fbe25d6bb70f5c34181dfef839cf2e59f09750ec49e2bc0c68e24bf922253bad97ef4b968a2c0a499a380d1169d5d616ae6b503b43a77355921ec2a75f52eb2008ead89d86c8416f46402d398a8bd9f4eb72f490e264beb8183d474a5e5fb6148736bb51ef9ea1de751372415b374be63e3e4dcf11e500d90920d1e62783ae844b39b0134fb00c656456210811dae750b4e81735c70828e18bcbd5bf46eedcc1fba3074da0d051d62975186feb65056180a04fe28fd78d2c5df82b0d2deaeb5e12b93cde638a184c0c4d5ad50e81b69e8f19c3f8fa064113ce618433c86760581cb2245de605fc1521bee34170851ff5ce7c8817d170a89556385d8f30c40574bef2aaa40f2b126133341f49022c271574e28cf1cd7ce8d740a71c43629e0abdbeb67ddf4bcfb92ee24c7880d7e88f09733ebc61847883866cc81bc619526dd21d8dc94842f76551d7d77f6df28f51b490226075f2a0488bc96b3d73366a2ff52e81b41293ed956e5f34b83d1694e41f051ca020d42d068856457f6f1c856503f6a1547a92b7267d2697e3dc7275574d66e418d1de81891caf51351f8a25158c86e81dc173eb8ed7eb9e2136ed4d0b2da0c7ecbff87b000b954f808e73081e36614cdf17b951cd34cd7703f1c4f804e8dd5da4862e0ae291887e7f82565946fc6a5977d9d669b92b89f2020ca061ca4e4197b7a8d4946604e3e5470b2bad2e13b3245a35b35af31436fd3f9f3428d529ded209e2617afc49a49ae1072f74556ff83aab7b950af836805a3dc0807b95e2f4dbaf61935d6722a7379c40185c8aa1418f9cfbbb277522c2b8ccd3c57bfc67f4560c783b8b1bbfe562d17a711f214c96ee8d17844ed461a8c864764264c4208c7e6efef450f9fe51aa2edb6251427c0f50b32b4dde77a1c16357e945f39b146e46dd9821060db89be93e432e5d965f373f829e9a1ff1d05ddd8bc0aa641a01ff7b78002631a3a71533e87f96a46193635b19db5d9a59751e0890dbc5beee5d75af1cf0fcb92ad7559f5e2a74737c4f228d71f3363a7046e8a986915c3da9fbe4818f3ee1ff4a44f75eb148fb7c22c5f149e45878256b8f7afb553370310faeb30307ea0c4186510d620a6d8a1f87e7e31bb06c6d7ac70997ff70f088e513e588bc33a682d71ec797058d0528e1d4b295183895678f7388e18b780cc63752591ecaa76e6c64bccc5b2048fc98cbefba5a9ffa1ba34eec4ff305acd4a79935952f23df5b946d251509c50bc6144d2283d70a5ebaceae7fdb4aca2b06c4f25bb6bacbb237a4d064e369dd2a713bb2c5b8a1388f1f8f8757e4901b5630d28012278297b4743fe2aaba3c9a50c12bda594882b48d0cedbca003dbcd71ff147bc467af047ced096422afbb9e77ac612ac1e5feca29afa82337506e387cd09fcbc0e3343b5f5075c0571f971ec811b671ca30e40243022a70d635e318959f9507aac28ddd08ddd3793000defb8ac83c8f6871fb921ac03bd97554c81053cf658e08644587a1df774f0c4f871681c649cfe27e3eff960a0f3c02a8b999112d66f22f16494cc10d2acd94566d2997a4baf44a057e78ff5ac86079f2c99bc07d256ef4ce8d63825c96a09890e9d40cdc49fd082ed0db9e74668ca3a56f46858c42aa30165f866cf11836d02712e70a43624f939d4557c66e5e1af3279c36b1efec371ab90faeb0cbaaab463c476195c850f3cda91510ae39c314435382a0109226f0fae6c6f1b3825de6bbf1ad0aa9d35056f7d3b8622fc9cb8005e4131387bda0fc3e302cdb624bb5b5dbd239ad7baa2e362bf722b6daf96f6691b4fc23df7375d172caac5c026934ce17eb69cc972c43f69a0e1ea6b966772cee4f086fd750862aecdd201883177a65b1caf3263bc742e1de2bf1b77ad81ae795f5f80da7dd04f3cbc6ffcd3d77095981f9076ae10daa89b8205f2da43932955c0e52c35c08d5c9a2fe0885630c9b4eb18655d4084b9dac55d7e93dd0efd75da92f8f59c595c25ce291ea0381214b84543aabfc4bae6e165cc52f981cd3808bbeb2b28bf4d17bb5a8b267ecc533d21ae64f48e53349badcf2745809c9541a97fa3a42f3363d628589fcccf56b42a6e9294c188e6625df4873d1f125ac8230dcc105bbd9106dc6ab0cb29e6a9ad49a30646fc13d84c27065b5e069bbfaf2d20c996ced8fde4e2a405dad8ed62b19db1a21cd4f4de40a4dcf19f57e3969ef25d4d1f3b9dacbaca8075d4a129a93c2cb99dcaaed801c387a4810eba74ac72c3ab1b61f036ff6db9303c412665007f09971072d14c11f5e4ece24b0c843d068e7e08f64129c0a7714544c46fe670a78b263953b0add8b98973e3b9e9123469ee611a27996a8a46ddaa6109b5e8b1d473ee3ac304611200e65a4da2090800e905e4e2d0dd4bc2ab2a09d2ca512f0a546a014e22cdb492fafc5c5bb272b66478e944b0db0ea086258b7afab7fd7db6560f4b227e40f4ecf7f3a6bb35ad86b69d1cf498f99939e1ba9cf0f5ed3585d16c4b80104d4edc61c73bc5948520965d8f8ee8d5800a6722d71fa8a1fc48e1987a59d1949e1ce83582e41f7e973be3d10ef2d1f6da46d60df0bfb48b6e0e632bbc6d5e0c57ffd63ae1b039fda15ac41645f43d17ef0bd753dbc35b9793cc60a967de11584f0cd7e1a2511befae6c9404a77562a260450f334952fc199d00ccbac0436feccf830aac94d6dae626aecb7cd82a5a1b29eabe12d12c3841b5bb6143ac00497dc96a0d170e74eb8d10253d963372fd4d9a53eedee2402316adaedcef817e9df483478b6cad53c59be8cd3b72ad7dbfd2335ef3851047967c3c3ac8e73e2dc45d16285f254ff040d8795bda8ca3cbd9ee1b73ed4e391dc1cfc9e5e598cb55623843a96de4c89bf2cd58e6b7431975076b3b65fe2979729650caf3ecf99aa13d5dda0e5d9bce84eecff78ce586da13c97538bd404c1bab4cbf4b568297fb6d8566c8532d485bf536f1aa70593b4eca397e681580ed174c7105278804616fe90a7403f2d4138ae21eb9ae2f8c1fc68897b81727fabcc45656f6c89bdf55a269178f7755135fe826449b6170a76bad2d907f186d2fc567154cbf87504807a991c814ca01fc71aa75ad36fc3a67e417471bab7df0697ac03ea13cb37525bcafca83701ed675d4c3df326e1331dbd36e0f878445ad1822dde2a889fbcf3de2fdd3a71392d127bd1e943b40654e7f22c59f47fbf680b295f2ea515a9e620daef09206acf27c85ee34936b63d8c1f6ceaeb04833159f7c091ed27ecd1e77f10bad1ac32a38e008f925c5de48c3816855d2df62186c7a948327497f96bd65333b86253647c62daa483fc256825cc20d2fb4f0067f0ff244e7d55cfb24272051b586ceda76cd44775828dce10625cde583f048ce8a8e7b25ab3323841b028fb7f669981d35c50f6d8da0e3d4ee22ac7cee48745fe1c65d53040f9cb1b299d49c53c90b39e87efe9801759112fe1a5b768e0be6a9a7109165d835061d41036cd3dfb228af5aa845e20bcbec2e5f995789dd22027ce3b52e19cf37cfe8cf7edfecac26ddfc57174049ad09b8d8cf28c73c160d47fed10e40f3f8d946d5f10bc6921b230f0d016603a7b11aee77717fcc084111fddfa100e15b783e57aa1912a5a1784d4ca4cb7a90fc196cd46e578a49fa9e896cfcf6793c751940cc421a839c68a683a72c8830bb9fd4837811f8e287e1d707601351cba36be365f1921078326ad88527285a186de71d73d81a440aee737b3a8e3a15dccb7de0cacf3dac0a12b770352d969888ec06f43011e37b97e816920a331d55f3154b7928fda31044a544685bcdeb2844f3a5bf09468e5c22f30feb2df279920dffebbf4df6963a861eccd677066abda9f4b4e0ba53bfbb608f7caa5859e0c672a2f2a66212d2e6eb78ad3c363991e448c87df1e57c5b5a40164b99c9b74d14b43715b0c24668602f70ded5a7c56cb8e2fab29e7e868dd22b73aaa9624eba8af1cf7e77efbc1b3af6a578a81ba57dee7776c61f5760c5bd4afe890f87c4d0ea7882c3da0c055e6a16c82ce86230709fc790e983ad7c0ca758f2bf3e35dba32318e35192ced4c2b05af026e2691e1d05ce51919076c1656ad26ef10988cd6a4de98466f5efe29538cbfbea2085fda86305d5b493b6a908012d72789a4fa73603032d6f3e3dbfa8a0e0cb23acc7407ad3739d5d7b4b7f7fffe251c4f968524ceb2a89db7b1bf46ab58c84a886a9f86946e67548148c2efcbc086ba2bd1f3580e928dfafe8044e6ec24b2875e632758fa5c5d020a39a3700f5935866f5b0862b5841abdc8d8e972ef52eec7a0494f3afcc035c388b41d54482bb960edacc416c8d4a58d2f7948bc7813f0f435cd2019952c0d3cb3a641e0bb4827072aaba8899230c8135fdef4020349d379abfdd741be83ac23fcd82d4d4873152de3a3051118ed0cb99b2ca836d187dfb1de24d42dd0926c0a46c713646327c533148e048bf1df729c9cff810da781073e73e563d98e4ded59dc3ca5e3a2f72b69a739d82e421af7afef55ff8b38b9d96190c416c2f76bea2f1e2a65fa89b28d2a23b0cda923686df70b37cdd9ff8324d3a4a2080bc554901974f4336386593ffffd304d41e4602546612d3c9daf6decfdbe7eab5de19c53fc3dff9f7ba06aa51ca80195fcb72cb015949913d4745aad7c0b2c39bbe604be76ad5c41cf351e83ec798071e95adbbff0b7681e81fcaa1886c75e1270f16820f398d4b54473810bba9abb6b2d81bf5c38a2d5d36f4f73d3fbca8d44c7cd1fb8a832b7a3a9a604ad8c164772a88d01f4072f213fb34f408003885ffad19f489935a08395855988c18947030f7cdcec8953894289c613ce7f50b5cee5e272694bd492120bdde2566a9836f0327281177a2af99d928c850e7afaefca40e12bbc288feac616ca00c8e5cc45ed7e48f486a1035c0c7690") perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x2, 0x3f, 0x7, 0x1, 0x0, 0x1, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7e, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x32, 0x6, 0x7fff, 0x1, 0xee8, 0x0, 0x354, 0x0, 0x1, 0x0, 0x3f}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0xc, &(0x7f0000000080)='&\xae#[(]:)/}-\x00'}, 0x30) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000180)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000180)}, {&(0x7f0000000300)=""/33, 0x21}], 0x2, &(0x7f0000000380)=ANY=[@ANYBLOB="20000000ff0300000000000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c00b6c2000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB], 0x70}, 0x10023) 04:07:01 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfb020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2581.191933][T12952] FAULT_INJECTION: forcing a failure. [ 2581.191933][T12952] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2581.221902][T12952] CPU: 0 PID: 12952 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2581.231988][T12952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 04:07:01 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x7}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:01 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfb030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x6000000}, 0x80) 04:07:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0xa, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2581.241884][T12952] Call Trace: [ 2581.245003][T12952] [ 2581.247779][T12952] dump_stack_lvl+0x151/0x1b7 [ 2581.252295][T12952] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2581.257606][T12952] dump_stack+0x15/0x17 [ 2581.261592][T12952] should_fail+0x3c0/0x510 [ 2581.265835][T12952] should_fail_alloc_page+0x58/0x70 [ 2581.270869][T12952] __alloc_pages+0x1de/0x7c0 [ 2581.275327][T12952] ? __count_vm_events+0x30/0x30 [ 2581.280069][T12952] ? __this_cpu_preempt_check+0x13/0x20 [ 2581.285453][T12952] ? __mod_node_page_state+0xac/0xf0 04:07:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x34, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2581.290603][T12952] pte_alloc_one+0x73/0x1b0 [ 2581.294926][T12952] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2581.299945][T12952] __pte_alloc+0x86/0x350 [ 2581.304198][T12952] ? free_pgtables+0x210/0x210 [ 2581.309755][T12952] ? _raw_spin_lock+0xa3/0x1b0 [ 2581.314368][T12952] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2581.319559][T12952] ? __kernel_text_address+0x9a/0x110 [ 2581.324768][T12952] copy_pte_range+0x1b1f/0x20b0 [ 2581.329458][T12952] ? __kunmap_atomic+0x80/0x80 [ 2581.334058][T12952] ? __kasan_slab_alloc+0xc4/0xe0 [ 2581.338998][T12952] ? __kasan_slab_alloc+0xb2/0xe0 [ 2581.343991][T12952] ? kmem_cache_alloc+0x189/0x2f0 [ 2581.348850][T12952] ? vm_area_dup+0x26/0x1d0 [ 2581.353269][T12952] ? dup_mmap+0x6b8/0xea0 [ 2581.357438][T12952] ? dup_mm+0x91/0x330 [ 2581.361343][T12952] ? copy_mm+0x108/0x1b0 [ 2581.365425][T12952] ? copy_process+0x1295/0x3250 [ 2581.370283][T12952] ? kernel_clone+0x22d/0x990 [ 2581.374795][T12952] ? __x64_sys_clone+0x289/0x310 [ 2581.379581][T12952] ? do_syscall_64+0x44/0xd0 [ 2581.383994][T12952] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb 04:07:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x20000, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2581.389899][T12952] copy_page_range+0xc1e/0x1090 [ 2581.394600][T12952] ? pfn_valid+0x1e0/0x1e0 [ 2581.399025][T12952] dup_mmap+0x99f/0xea0 [ 2581.403119][T12952] ? __delayed_free_task+0x20/0x20 [ 2581.408051][T12952] ? mm_init+0x807/0x960 [ 2581.412127][T12952] dup_mm+0x91/0x330 [ 2581.415857][T12952] copy_mm+0x108/0x1b0 [ 2581.419764][T12952] copy_process+0x1295/0x3250 [ 2581.424284][T12952] ? proc_fail_nth_write+0x213/0x290 [ 2581.429401][T12952] ? proc_fail_nth_read+0x220/0x220 [ 2581.434436][T12952] ? pidfd_show_fdinfo+0x2b0/0x2b0 04:07:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2581.439379][T12952] ? vfs_write+0x9af/0x1050 [ 2581.443717][T12952] ? vmacache_update+0xb7/0x120 [ 2581.448406][T12952] kernel_clone+0x22d/0x990 [ 2581.452744][T12952] ? file_end_write+0x1b0/0x1b0 [ 2581.457431][T12952] ? __kasan_check_write+0x14/0x20 [ 2581.462556][T12952] ? create_io_thread+0x1e0/0x1e0 [ 2581.467523][T12952] ? __mutex_lock_slowpath+0x10/0x10 [ 2581.472733][T12952] __x64_sys_clone+0x289/0x310 [ 2581.477323][T12952] ? __do_sys_vfork+0x130/0x130 [ 2581.482222][T12952] ? debug_smp_processor_id+0x17/0x20 [ 2581.487491][T12952] do_syscall_64+0x44/0xd0 [ 2581.491741][T12952] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2581.497455][T12952] RIP: 0033:0x7fd2e6d030d9 [ 2581.501985][T12952] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2581.521693][T12952] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2581.529924][T12952] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2581.537739][T12952] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2581.545544][T12952] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2581.553446][T12952] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2581.561260][T12952] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2581.569071][T12952] 04:07:01 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 52) 04:07:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x7000000}, 0x80) 04:07:01 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfb040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:01 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = syz_clone(0x840800, &(0x7f00000000c0)="11dbb6762e0d06a4f7af909ca7b832fd23b31192067e6d3163a8dca96956b87244b50f49c029d5d5465ac16226329f50fa42709bb609b49a5ae262fc1aed524173071a99d2", 0x45, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000011c0)="3c8a31794c7c165707c5b8013733a4dda72f6f771385590221c6870a31529540fdd8fbec80b340d82d7bb0af50a175199c4760d2344af504a6a7763d6d30e34bab8d57e0b1cdbd5cacba8094928f3d3709fe870d6ae5dc84a6e6f6034459b31b50c048c9840d4d03d21d291713792fcd1cbdf6b9313c32c86567bcbe0cdde596e0b26606efa24b6c69f24a72d8e2609ba5666f2898b51dd39b4bda27c86d4aac623c1b23d7ac918cb22af1a3da8c8a6627a846660194d2cb4c525ae13b16186f6199d02c67d2e03231179dd65213db1933c3233e26daed3fed22480389556aec1fbd876f2c6950fb72314df2599921432c0c051214f8886b917d1f180fda8bbe083123e8e2e6a99361c5d87a0b8eff4569653b8f64c6e68f5e85d672d6e39634ddc669cec5a6cd16eded567b232ee2b907e897fb06de5ef806b3bedd814561aa4a2fffc86f19769c541a7f4a5924fc45fce0a41b3995421d030a31afa71c7af6cb368469f1946965823e68e678d06bfddb2a2eb81062162cc3a5417c4d8dc20a8b4ed39fe299df21ca31d91049eddefd82133aa5363335a93d2386ae0a1355612e061c50decc49b8aada30babf250a76031cb93100cc3fc7d6c1f6a6a1190bc5b7ca19fd7e4bea494fa757793b713127804ac545cbc95e15de6eb2e97524a0876d9862ede97a048476ae6008cec38928ea3da8f3bd55ddad9b88826ca1a60642a4f711246a131638bd6bd1364266ade7e5722847e3c6c9efa43d7c4ea91995a43c19f6d7361df8e3b3119769785450c79885a212371b5e3f5aa3fd9f3c4c03b8ff62aaf922397eaef3482359948bf9fb042d92fbe25d6bb70f5c34181dfef839cf2e59f09750ec49e2bc0c68e24bf922253bad97ef4b968a2c0a499a380d1169d5d616ae6b503b43a77355921ec2a75f52eb2008ead89d86c8416f46402d398a8bd9f4eb72f490e264beb8183d474a5e5fb6148736bb51ef9ea1de751372415b374be63e3e4dcf11e500d90920d1e62783ae844b39b0134fb00c656456210811dae750b4e81735c70828e18bcbd5bf46eedcc1fba3074da0d051d62975186feb65056180a04fe28fd78d2c5df82b0d2deaeb5e12b93cde638a184c0c4d5ad50e81b69e8f19c3f8fa064113ce618433c86760581cb2245de605fc1521bee34170851ff5ce7c8817d170a89556385d8f30c40574bef2aaa40f2b126133341f49022c271574e28cf1cd7ce8d740a71c43629e0abdbeb67ddf4bcfb92ee24c7880d7e88f09733ebc61847883866cc81bc619526dd21d8dc94842f76551d7d77f6df28f51b490226075f2a0488bc96b3d73366a2ff52e81b41293ed956e5f34b83d1694e41f051ca020d42d068856457f6f1c856503f6a1547a92b7267d2697e3dc7275574d66e418d1de81891caf51351f8a25158c86e81dc173eb8ed7eb9e2136ed4d0b2da0c7ecbff87b000b954f808e73081e36614cdf17b951cd34cd7703f1c4f804e8dd5da4862e0ae291887e7f82565946fc6a5977d9d669b92b89f2020ca061ca4e4197b7a8d4946604e3e5470b2bad2e13b3245a35b35af31436fd3f9f3428d529ded209e2617afc49a49ae1072f74556ff83aab7b950af836805a3dc0807b95e2f4dbaf61935d6722a7379c40185c8aa1418f9cfbbb277522c2b8ccd3c57bfc67f4560c783b8b1bbfe562d17a711f214c96ee8d17844ed461a8c864764264c4208c7e6efef450f9fe51aa2edb6251427c0f50b32b4dde77a1c16357e945f39b146e46dd9821060db89be93e432e5d965f373f829e9a1ff1d05ddd8bc0aa641a01ff7b78002631a3a71533e87f96a46193635b19db5d9a59751e0890dbc5beee5d75af1cf0fcb92ad7559f5e2a74737c4f228d71f3363a7046e8a986915c3da9fbe4818f3ee1ff4a44f75eb148fb7c22c5f149e45878256b8f7afb553370310faeb30307ea0c4186510d620a6d8a1f87e7e31bb06c6d7ac70997ff70f088e513e588bc33a682d71ec797058d0528e1d4b295183895678f7388e18b780cc63752591ecaa76e6c64bccc5b2048fc98cbefba5a9ffa1ba34eec4ff305acd4a79935952f23df5b946d251509c50bc6144d2283d70a5ebaceae7fdb4aca2b06c4f25bb6bacbb237a4d064e369dd2a713bb2c5b8a1388f1f8f8757e4901b5630d28012278297b4743fe2aaba3c9a50c12bda594882b48d0cedbca003dbcd71ff147bc467af047ced096422afbb9e77ac612ac1e5feca29afa82337506e387cd09fcbc0e3343b5f5075c0571f971ec811b671ca30e40243022a70d635e318959f9507aac28ddd08ddd3793000defb8ac83c8f6871fb921ac03bd97554c81053cf658e08644587a1df774f0c4f871681c649cfe27e3eff960a0f3c02a8b999112d66f22f16494cc10d2acd94566d2997a4baf44a057e78ff5ac86079f2c99bc07d256ef4ce8d63825c96a09890e9d40cdc49fd082ed0db9e74668ca3a56f46858c42aa30165f866cf11836d02712e70a43624f939d4557c66e5e1af3279c36b1efec371ab90faeb0cbaaab463c476195c850f3cda91510ae39c314435382a0109226f0fae6c6f1b3825de6bbf1ad0aa9d35056f7d3b8622fc9cb8005e4131387bda0fc3e302cdb624bb5b5dbd239ad7baa2e362bf722b6daf96f6691b4fc23df7375d172caac5c026934ce17eb69cc972c43f69a0e1ea6b966772cee4f086fd750862aecdd201883177a65b1caf3263bc742e1de2bf1b77ad81ae795f5f80da7dd04f3cbc6ffcd3d77095981f9076ae10daa89b8205f2da43932955c0e52c35c08d5c9a2fe0885630c9b4eb18655d4084b9dac55d7e93dd0efd75da92f8f59c595c25ce291ea0381214b84543aabfc4bae6e165cc52f981cd3808bbeb2b28bf4d17bb5a8b267ecc533d21ae64f48e53349badcf2745809c9541a97fa3a42f3363d628589fcccf56b42a6e9294c188e6625df4873d1f125ac8230dcc105bbd9106dc6ab0cb29e6a9ad49a30646fc13d84c27065b5e069bbfaf2d20c996ced8fde4e2a405dad8ed62b19db1a21cd4f4de40a4dcf19f57e3969ef25d4d1f3b9dacbaca8075d4a129a93c2cb99dcaaed801c387a4810eba74ac72c3ab1b61f036ff6db9303c412665007f09971072d14c11f5e4ece24b0c843d068e7e08f64129c0a7714544c46fe670a78b263953b0add8b98973e3b9e9123469ee611a27996a8a46ddaa6109b5e8b1d473ee3ac304611200e65a4da2090800e905e4e2d0dd4bc2ab2a09d2ca512f0a546a014e22cdb492fafc5c5bb272b66478e944b0db0ea086258b7afab7fd7db6560f4b227e40f4ecf7f3a6bb35ad86b69d1cf498f99939e1ba9cf0f5ed3585d16c4b80104d4edc61c73bc5948520965d8f8ee8d5800a6722d71fa8a1fc48e1987a59d1949e1ce83582e41f7e973be3d10ef2d1f6da46d60df0bfb48b6e0e632bbc6d5e0c57ffd63ae1b039fda15ac41645f43d17ef0bd753dbc35b9793cc60a967de11584f0cd7e1a2511befae6c9404a77562a260450f334952fc199d00ccbac0436feccf830aac94d6dae626aecb7cd82a5a1b29eabe12d12c3841b5bb6143ac00497dc96a0d170e74eb8d10253d963372fd4d9a53eedee2402316adaedcef817e9df483478b6cad53c59be8cd3b72ad7dbfd2335ef3851047967c3c3ac8e73e2dc45d16285f254ff040d8795bda8ca3cbd9ee1b73ed4e391dc1cfc9e5e598cb55623843a96de4c89bf2cd58e6b7431975076b3b65fe2979729650caf3ecf99aa13d5dda0e5d9bce84eecff78ce586da13c97538bd404c1bab4cbf4b568297fb6d8566c8532d485bf536f1aa70593b4eca397e681580ed174c7105278804616fe90a7403f2d4138ae21eb9ae2f8c1fc68897b81727fabcc45656f6c89bdf55a269178f7755135fe826449b6170a76bad2d907f186d2fc567154cbf87504807a991c814ca01fc71aa75ad36fc3a67e417471bab7df0697ac03ea13cb37525bcafca83701ed675d4c3df326e1331dbd36e0f878445ad1822dde2a889fbcf3de2fdd3a71392d127bd1e943b40654e7f22c59f47fbf680b295f2ea515a9e620daef09206acf27c85ee34936b63d8c1f6ceaeb04833159f7c091ed27ecd1e77f10bad1ac32a38e008f925c5de48c3816855d2df62186c7a948327497f96bd65333b86253647c62daa483fc256825cc20d2fb4f0067f0ff244e7d55cfb24272051b586ceda76cd44775828dce10625cde583f048ce8a8e7b25ab3323841b028fb7f669981d35c50f6d8da0e3d4ee22ac7cee48745fe1c65d53040f9cb1b299d49c53c90b39e87efe9801759112fe1a5b768e0be6a9a7109165d835061d41036cd3dfb228af5aa845e20bcbec2e5f995789dd22027ce3b52e19cf37cfe8cf7edfecac26ddfc57174049ad09b8d8cf28c73c160d47fed10e40f3f8d946d5f10bc6921b230f0d016603a7b11aee77717fcc084111fddfa100e15b783e57aa1912a5a1784d4ca4cb7a90fc196cd46e578a49fa9e896cfcf6793c751940cc421a839c68a683a72c8830bb9fd4837811f8e287e1d707601351cba36be365f1921078326ad88527285a186de71d73d81a440aee737b3a8e3a15dccb7de0cacf3dac0a12b770352d969888ec06f43011e37b97e816920a331d55f3154b7928fda31044a544685bcdeb2844f3a5bf09468e5c22f30feb2df279920dffebbf4df6963a861eccd677066abda9f4b4e0ba53bfbb608f7caa5859e0c672a2f2a66212d2e6eb78ad3c363991e448c87df1e57c5b5a40164b99c9b74d14b43715b0c24668602f70ded5a7c56cb8e2fab29e7e868dd22b73aaa9624eba8af1cf7e77efbc1b3af6a578a81ba57dee7776c61f5760c5bd4afe890f87c4d0ea7882c3da0c055e6a16c82ce86230709fc790e983ad7c0ca758f2bf3e35dba32318e35192ced4c2b05af026e2691e1d05ce51919076c1656ad26ef10988cd6a4de98466f5efe29538cbfbea2085fda86305d5b493b6a908012d72789a4fa73603032d6f3e3dbfa8a0e0cb23acc7407ad3739d5d7b4b7f7fffe251c4f968524ceb2a89db7b1bf46ab58c84a886a9f86946e67548148c2efcbc086ba2bd1f3580e928dfafe8044e6ec24b2875e632758fa5c5d020a39a3700f5935866f5b0862b5841abdc8d8e972ef52eec7a0494f3afcc035c388b41d54482bb960edacc416c8d4a58d2f7948bc7813f0f435cd2019952c0d3cb3a641e0bb4827072aaba8899230c8135fdef4020349d379abfdd741be83ac23fcd82d4d4873152de3a3051118ed0cb99b2ca836d187dfb1de24d42dd0926c0a46c713646327c533148e048bf1df729c9cff810da781073e73e563d98e4ded59dc3ca5e3a2f72b69a739d82e421af7afef55ff8b38b9d96190c416c2f76bea2f1e2a65fa89b28d2a23b0cda923686df70b37cdd9ff8324d3a4a2080bc554901974f4336386593ffffd304d41e4602546612d3c9daf6decfdbe7eab5de19c53fc3dff9f7ba06aa51ca80195fcb72cb015949913d4745aad7c0b2c39bbe604be76ad5c41cf351e83ec798071e95adbbff0b7681e81fcaa1886c75e1270f16820f398d4b54473810bba9abb6b2d81bf5c38a2d5d36f4f73d3fbca8d44c7cd1fb8a832b7a3a9a604ad8c164772a88d01f4072f213fb34f408003885ffad19f489935a08395855988c18947030f7cdcec8953894289c613ce7f50b5cee5e272694bd492120bdde2566a9836f0327281177a2af99d928c850e7afaefca40e12bbc288feac616ca00c8e5cc45ed7e48f486a1035c0c7690") perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x2, 0x3f, 0x7, 0x1, 0x0, 0x1, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7e, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x32, 0x6, 0x7fff, 0x1, 0xee8, 0x0, 0x354, 0x0, 0x1, 0x0, 0x3f}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0xc, &(0x7f0000000080)='&\xae#[(]:)/}-\x00'}, 0x30) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000180)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000180)}, {&(0x7f0000000300)=""/33, 0x21}], 0x2, &(0x7f0000000380)=ANY=[@ANYBLOB="20000000ff0300000000000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c00b6c2000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB], 0x70}, 0x10023) 04:07:02 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x8}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfc000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x8000000}, 0x80) 04:07:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfc010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x9000000}, 0x80) 04:07:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfc020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2581.736457][T12979] FAULT_INJECTION: forcing a failure. [ 2581.736457][T12979] name failslab, interval 1, probability 0, space 0, times 0 04:07:02 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x3, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2581.819855][T12979] CPU: 1 PID: 12979 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2581.830124][T12979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2581.840088][T12979] Call Trace: [ 2581.843211][T12979] [ 2581.846082][T12979] dump_stack_lvl+0x151/0x1b7 [ 2581.850503][T12979] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2581.856174][T12979] dump_stack+0x15/0x17 [ 2581.860225][T12979] should_fail+0x3c0/0x510 [ 2581.864492][T12979] __should_failslab+0x9f/0xe0 [ 2581.869106][T12979] should_failslab+0x9/0x20 [ 2581.873652][T12979] kmem_cache_alloc+0x4f/0x2f0 [ 2581.878244][T12979] ? vm_area_dup+0x26/0x1d0 [ 2581.882665][T12979] vm_area_dup+0x26/0x1d0 [ 2581.886918][T12979] dup_mmap+0x6b8/0xea0 [ 2581.890911][T12979] ? __delayed_free_task+0x20/0x20 [ 2581.895856][T12979] ? mm_init+0x807/0x960 [ 2581.899945][T12979] dup_mm+0x91/0x330 [ 2581.903776][T12979] copy_mm+0x108/0x1b0 [ 2581.907668][T12979] copy_process+0x1295/0x3250 [ 2581.912185][T12979] ? proc_fail_nth_write+0x213/0x290 [ 2581.917394][T12979] ? proc_fail_nth_read+0x220/0x220 [ 2581.922442][T12979] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2581.927389][T12979] ? vfs_write+0x9af/0x1050 [ 2581.931910][T12979] kernel_clone+0x22d/0x990 [ 2581.936229][T12979] ? file_end_write+0x1b0/0x1b0 [ 2581.940915][T12979] ? __kasan_check_write+0x14/0x20 [ 2581.945860][T12979] ? create_io_thread+0x1e0/0x1e0 [ 2581.950724][T12979] ? __mutex_lock_slowpath+0x10/0x10 [ 2581.955842][T12979] __x64_sys_clone+0x289/0x310 [ 2581.960445][T12979] ? __do_sys_vfork+0x130/0x130 [ 2581.965218][T12979] ? debug_smp_processor_id+0x17/0x20 [ 2581.970445][T12979] do_syscall_64+0x44/0xd0 [ 2581.974690][T12979] ? irqentry_exit+0x12/0x40 [ 2581.979350][T12979] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2581.985076][T12979] RIP: 0033:0x7fd2e6d030d9 [ 2581.989331][T12979] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2582.008789][T12979] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 04:07:02 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 53) 04:07:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xa000000}, 0x80) 04:07:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfc030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:02 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r0 = syz_clone(0x840800, &(0x7f00000000c0)="11dbb6762e0d06a4f7af909ca7b832fd23b31192067e6d3163a8dca96956b87244b50f49c029d5d5465ac16226329f50fa42709bb609b49a5ae262fc1aed524173071a99d2", 0x45, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000011c0)="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") (rerun: 64) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x2, 0x3f, 0x7, 0x1, 0x0, 0x1, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7e, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x32, 0x6, 0x7fff, 0x1, 0xee8, 0x0, 0x354, 0x0, 0x1, 0x0, 0x3f}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async, rerun: 32) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040), 0x10) (rerun: 32) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0xc, &(0x7f0000000080)='&\xae#[(]:)/}-\x00'}, 0x30) (async) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000180)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000180)}, {&(0x7f0000000300)=""/33, 0x21}], 0x2, &(0x7f0000000380)=ANY=[@ANYBLOB="20000000ff0300000000000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c00b6c2000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB], 0x70}, 0x10023) 04:07:02 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2582.017015][T12979] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2582.024828][T12979] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2582.033266][T12979] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2582.041056][T12979] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2582.048952][T12979] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2582.056778][T12979] [ 2582.103448][T13006] FAULT_INJECTION: forcing a failure. [ 2582.103448][T13006] name failslab, interval 1, probability 0, space 0, times 0 [ 2582.128841][T13006] CPU: 1 PID: 13006 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2582.138919][T13006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2582.148820][T13006] Call Trace: [ 2582.151987][T13006] [ 2582.154716][T13006] dump_stack_lvl+0x151/0x1b7 [ 2582.159235][T13006] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2582.164540][T13006] dump_stack+0x15/0x17 [ 2582.168512][T13006] should_fail+0x3c0/0x510 [ 2582.172765][T13006] __should_failslab+0x9f/0xe0 [ 2582.177363][T13006] should_failslab+0x9/0x20 [ 2582.181700][T13006] kmem_cache_alloc+0x4f/0x2f0 [ 2582.186300][T13006] ? vm_area_dup+0x26/0x1d0 [ 2582.190642][T13006] ? __kasan_check_read+0x11/0x20 [ 2582.195510][T13006] vm_area_dup+0x26/0x1d0 [ 2582.199668][T13006] dup_mmap+0x6b8/0xea0 [ 2582.203666][T13006] ? __delayed_free_task+0x20/0x20 [ 2582.208609][T13006] ? mm_init+0x807/0x960 [ 2582.212686][T13006] dup_mm+0x91/0x330 [ 2582.216420][T13006] copy_mm+0x108/0x1b0 [ 2582.220325][T13006] copy_process+0x1295/0x3250 [ 2582.224838][T13006] ? proc_fail_nth_write+0x213/0x290 [ 2582.230130][T13006] ? proc_fail_nth_read+0x220/0x220 [ 2582.235168][T13006] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2582.240197][T13006] ? vfs_write+0x9af/0x1050 [ 2582.244549][T13006] ? vmacache_update+0xb7/0x120 [ 2582.249229][T13006] kernel_clone+0x22d/0x990 [ 2582.253578][T13006] ? file_end_write+0x1b0/0x1b0 [ 2582.258253][T13006] ? __kasan_check_write+0x14/0x20 [ 2582.263287][T13006] ? create_io_thread+0x1e0/0x1e0 [ 2582.268157][T13006] ? __mutex_lock_slowpath+0x10/0x10 [ 2582.273278][T13006] __x64_sys_clone+0x289/0x310 [ 2582.277874][T13006] ? __do_sys_vfork+0x130/0x130 [ 2582.282559][T13006] ? debug_smp_processor_id+0x17/0x20 [ 2582.287904][T13006] do_syscall_64+0x44/0xd0 [ 2582.292156][T13006] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2582.297962][T13006] RIP: 0033:0x7fd2e6d030d9 [ 2582.302217][T13006] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2582.321653][T13006] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2582.329989][T13006] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2582.337799][T13006] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2582.345622][T13006] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2582.353701][T13006] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2582.361494][T13006] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2582.369339][T13006] 04:07:02 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x10}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfc040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xb000000}, 0x80) 04:07:02 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x5, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xc000000}, 0x80) 04:07:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfd000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfd010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:02 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 54) 04:07:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xd000000}, 0x80) 04:07:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfd020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2582.658199][T13052] FAULT_INJECTION: forcing a failure. [ 2582.658199][T13052] name failslab, interval 1, probability 0, space 0, times 0 [ 2582.689021][T13052] CPU: 0 PID: 13052 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2582.699185][T13052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2582.709081][T13052] Call Trace: [ 2582.712214][T13052] [ 2582.714984][T13052] dump_stack_lvl+0x151/0x1b7 [ 2582.719502][T13052] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2582.724798][T13052] dump_stack+0x15/0x17 [ 2582.728790][T13052] should_fail+0x3c0/0x510 [ 2582.733037][T13052] __should_failslab+0x9f/0xe0 [ 2582.737633][T13052] should_failslab+0x9/0x20 [ 2582.741987][T13052] kmem_cache_alloc+0x4f/0x2f0 [ 2582.746583][T13052] ? vm_area_dup+0x26/0x1d0 [ 2582.750941][T13052] vm_area_dup+0x26/0x1d0 [ 2582.755082][T13052] dup_mmap+0x6b8/0xea0 [ 2582.759080][T13052] ? __delayed_free_task+0x20/0x20 [ 2582.764023][T13052] ? mm_init+0x807/0x960 [ 2582.768118][T13052] dup_mm+0x91/0x330 [ 2582.772268][T13052] copy_mm+0x108/0x1b0 [ 2582.776259][T13052] copy_process+0x1295/0x3250 [ 2582.780800][T13052] ? proc_fail_nth_write+0x213/0x290 [ 2582.785891][T13052] ? proc_fail_nth_read+0x220/0x220 [ 2582.790927][T13052] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2582.795878][T13052] ? vfs_write+0x9af/0x1050 [ 2582.800822][T13052] ? vmacache_update+0xb7/0x120 [ 2582.805514][T13052] kernel_clone+0x22d/0x990 [ 2582.809935][T13052] ? file_end_write+0x1b0/0x1b0 [ 2582.814616][T13052] ? __kasan_check_write+0x14/0x20 [ 2582.819568][T13052] ? create_io_thread+0x1e0/0x1e0 [ 2582.824425][T13052] ? __mutex_lock_slowpath+0x10/0x10 [ 2582.829644][T13052] __x64_sys_clone+0x289/0x310 [ 2582.834234][T13052] ? __do_sys_vfork+0x130/0x130 [ 2582.838933][T13052] ? debug_smp_processor_id+0x17/0x20 [ 2582.844131][T13052] do_syscall_64+0x44/0xd0 [ 2582.848389][T13052] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2582.854131][T13052] RIP: 0033:0x7fd2e6d030d9 [ 2582.858364][T13052] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2582.878235][T13052] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2582.882167][T13008] cgroup: fork rejected by pids controller in [ 2582.886564][T13052] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2582.886584][T13052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2582.886595][T13052] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2582.886605][T13052] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2582.886615][T13052] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2582.886630][T13052] 04:07:03 executing program 1: syz_clone(0x2c0a0280, 0x0, 0xab, 0x0, 0x0, 0x0) 04:07:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x7, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:03 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfd030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xe000000}, 0x80) 04:07:03 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:03 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 55) 04:07:03 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfd040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:03 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfe000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x10000000}, 0x80) [ 2583.049010][T13008] /syz1 [ 2583.063382][T13068] FAULT_INJECTION: forcing a failure. [ 2583.063382][T13068] name failslab, interval 1, probability 0, space 0, times 0 04:07:03 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfe010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x11000000}, 0x80) 04:07:03 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfe020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2583.112706][T13068] CPU: 1 PID: 13068 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2583.123482][T13068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2583.133380][T13068] Call Trace: [ 2583.136508][T13068] [ 2583.140357][T13068] dump_stack_lvl+0x151/0x1b7 [ 2583.144885][T13068] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2583.150165][T13068] dump_stack+0x15/0x17 [ 2583.154239][T13068] should_fail+0x3c0/0x510 04:07:03 executing program 1: syz_clone(0x2c0a0280, 0x0, 0xab, 0x0, 0x0, 0x0) syz_clone(0x2c0a0280, 0x0, 0xab, 0x0, 0x0, 0x0) (async) [ 2583.158496][T13068] __should_failslab+0x9f/0xe0 [ 2583.163100][T13068] should_failslab+0x9/0x20 [ 2583.167432][T13068] kmem_cache_alloc+0x4f/0x2f0 [ 2583.172130][T13068] ? vm_area_dup+0x26/0x1d0 [ 2583.176461][T13068] vm_area_dup+0x26/0x1d0 [ 2583.180629][T13068] dup_mmap+0x6b8/0xea0 [ 2583.184628][T13068] ? __delayed_free_task+0x20/0x20 [ 2583.189568][T13068] ? mm_init+0x807/0x960 [ 2583.193645][T13068] dup_mm+0x91/0x330 [ 2583.197385][T13068] copy_mm+0x108/0x1b0 [ 2583.201280][T13068] copy_process+0x1295/0x3250 [ 2583.205801][T13068] ? proc_fail_nth_write+0x213/0x290 04:07:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:03 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfe030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x12000000}, 0x80) [ 2583.211020][T13068] ? proc_fail_nth_read+0x220/0x220 [ 2583.216203][T13068] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2583.221141][T13068] ? vfs_write+0x9af/0x1050 [ 2583.225766][T13068] ? vmacache_update+0xb7/0x120 [ 2583.230432][T13068] kernel_clone+0x22d/0x990 [ 2583.234857][T13068] ? file_end_write+0x1b0/0x1b0 [ 2583.239554][T13068] ? __kasan_check_write+0x14/0x20 [ 2583.244575][T13068] ? create_io_thread+0x1e0/0x1e0 [ 2583.249712][T13068] ? __mutex_lock_slowpath+0x10/0x10 [ 2583.254931][T13068] __x64_sys_clone+0x289/0x310 [ 2583.259541][T13068] ? __do_sys_vfork+0x130/0x130 [ 2583.264237][T13068] ? debug_smp_processor_id+0x17/0x20 [ 2583.269617][T13068] do_syscall_64+0x44/0xd0 [ 2583.274458][T13068] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2583.280277][T13068] RIP: 0033:0x7fd2e6d030d9 [ 2583.284538][T13068] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2583.304052][T13068] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2583.312303][T13068] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2583.320200][T13068] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2583.328314][T13068] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2583.336181][T13068] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2583.343992][T13068] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2583.351807][T13068] 04:07:03 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x2}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:03 executing program 1: syz_clone(0x2c0a0280, 0x0, 0xab, 0x0, 0x0, 0x0) 04:07:03 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfe040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x10, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:03 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 56) 04:07:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x18000000}, 0x80) 04:07:03 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xff000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x20000000}, 0x80) 04:07:03 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x14b, 0xe7, &(0x7f0000000700)="668eca940807bf9d04e402d93d83483cfc12e5d0c571003e73e07dc7deb6d42706d8c52eb724375da373c3ad35bbe09e89b2f1cefcfb0d1db554341e123c331f16b23d9c4e9bde9332f1d6963ecf824e3ee6bb6d0d113d8a91a7bcf2f8071edb186810e0736e2b42d271823a876b144357c8f7ae3fb4d3b459b89d339324125978d79b9190d88bab542c7f93266172544a3324bf9bf6489677ea5d63f87f95a5556e6736c7efd01dc3f488a478db750dee3e7ff5d2e5f55be96eb0ba8b3f07996327c659adbb36587fb7b1a29e74d0e56036883952f523ca1ee121c7f4e9fc4865f78eb2e8eea656434249e29a12eda115575d21b32749a8c907c389f32df935897044e67020a0397a35b66083199834f7fe5a8e6677e072b083df15def9fb3b682e451173739f90e2d5f57f72f3a6b8822b472e06d28f94d637c4d4f436b3f535679342e3fda613e58641", &(0x7f0000000240)=""/231, 0x800001, 0x0, 0xba, 0xf0, &(0x7f0000000180)="5c61b54bb5144cad5f5e4423cbc3da329a3b57576d0e3484ab0c2ecacbdb0a5c8b10590c4f6fd9710e8b86ae7dcc58118d712f85438b1c93b3c2d9c9cdeb6c4b5a1f7419cd8c6ebb2a7bac2cd47effa8e3d202dadf342e6ecf9d86f537063db663f43f023e5a6e6d7b0dd20c8175adccd8af69ec0f95fbce84ad753c118b715ddbacc7d7a530c29d0297eaa5c2b660c1b2cf7d4c9f33340845579dec2684600e02945a566d5ce3f77ffdf2d47d8d3b779034046937907de200bd", &(0x7f0000000880)="43ccb5ff76ef483f93ba8f07b81214c85e76f486554c13fab637259d1579cc1f2807d29ab9c6dfeac2aabbade6b041df8cb9b7ff582615545f8af0d162f8494b12c7b1c96556877688faa2fcdee35cc88bce55ea570d9908f16bbc7a41b303a888b17587e39740e24332e44a63092ff2136db2a19fc11ae5845a764e4d8b365ed7cdee2b2b8971fddebe650dfa13efda686f8eb410fa0da672dadb6a5e63e332875811a6c30a0b12530b59f60a1c2b5eff4aecdd193a747207be52e99d54e3985b2f00000000000000000000000000000087b15079941144733fbc5566cb926e2a02ebc6e9c16e7e2cbfea36df1e5ad2", 0x1, 0x81}, 0x48) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x0, 0x5, 0xfe, &(0x7f0000000400)="43ef7ce6ee", &(0x7f0000000440)=""/254, 0x40236c79, 0x0, 0x6a, 0x88, &(0x7f0000000540)="ab6686a9422e50906bb0b0d028aae8ccbf8426a96274da7c587a0bac8e5dbccb77ae321510c51d802d34ade00cae61580206ebeae21f46c9ed2f1d1447d9b65f8c1f2bc9962f652527a20d60c964b1dfbf4501e7eeb8a12b853f9bc057456fa19191846c6cdf9d48db96", &(0x7f00000005c0)="71ce75d216e4bcd08c3920348e7d22c6173c3aa06dc195bbf1875b2f27f71e445df9f7361be948874a8de0d527112a6bc56c3e37bb9e43a228ef68527ab4a65f86768c2eae0e92b59db71c165b812c7c688191cba82b575b7a4e49c0b7fd245105ab771eb184c77a2e102e6970a0c49480e65c5c646682a2fa28c02068089348af0254baa46982a5", 0x1, 0x80000000}, 0x48) syz_clone(0x26244900, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2583.467791][T13104] FAULT_INJECTION: forcing a failure. [ 2583.467791][T13104] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2583.493492][T13104] CPU: 1 PID: 13104 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2583.503574][T13104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2583.513473][T13104] Call Trace: 04:07:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x25000000}, 0x80) 04:07:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x11, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x41000000}, 0x80) [ 2583.516593][T13104] [ 2583.519375][T13104] dump_stack_lvl+0x151/0x1b7 [ 2583.524247][T13104] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2583.529539][T13104] dump_stack+0x15/0x17 [ 2583.533516][T13104] should_fail+0x3c0/0x510 [ 2583.537774][T13104] should_fail_alloc_page+0x58/0x70 [ 2583.542806][T13104] __alloc_pages+0x1de/0x7c0 [ 2583.547232][T13104] ? __count_vm_events+0x30/0x30 [ 2583.552005][T13104] ? __this_cpu_preempt_check+0x13/0x20 [ 2583.557400][T13104] ? __mod_node_page_state+0xac/0xf0 [ 2583.562514][T13104] pte_alloc_one+0x73/0x1b0 [ 2583.566847][T13104] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2583.571881][T13104] __pte_alloc+0x86/0x350 [ 2583.576049][T13104] ? free_pgtables+0x210/0x210 [ 2583.580648][T13104] ? _raw_spin_lock+0xa3/0x1b0 [ 2583.585260][T13104] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2583.590452][T13104] ? __kernel_text_address+0x9a/0x110 [ 2583.595662][T13104] copy_pte_range+0x1b1f/0x20b0 [ 2583.600352][T13104] ? __kunmap_atomic+0x80/0x80 [ 2583.604946][T13104] ? __kasan_slab_alloc+0xc4/0xe0 [ 2583.609825][T13104] ? __kasan_slab_alloc+0xb2/0xe0 [ 2583.614667][T13104] ? kmem_cache_alloc+0x189/0x2f0 [ 2583.619538][T13104] ? vm_area_dup+0x26/0x1d0 [ 2583.623876][T13104] ? dup_mmap+0x6b8/0xea0 [ 2583.628032][T13104] ? dup_mm+0x91/0x330 [ 2583.631943][T13104] ? copy_mm+0x108/0x1b0 [ 2583.636019][T13104] ? copy_process+0x1295/0x3250 [ 2583.640701][T13104] ? kernel_clone+0x22d/0x990 [ 2583.645221][T13104] ? __x64_sys_clone+0x289/0x310 [ 2583.649992][T13104] ? do_syscall_64+0x44/0xd0 [ 2583.654423][T13104] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2583.660346][T13104] copy_page_range+0xc1e/0x1090 [ 2583.665008][T13104] ? pfn_valid+0x1e0/0x1e0 [ 2583.669262][T13104] dup_mmap+0x99f/0xea0 [ 2583.673383][T13104] ? __delayed_free_task+0x20/0x20 [ 2583.678416][T13104] ? mm_init+0x807/0x960 [ 2583.682492][T13104] dup_mm+0x91/0x330 [ 2583.686394][T13104] copy_mm+0x108/0x1b0 [ 2583.690297][T13104] copy_process+0x1295/0x3250 [ 2583.694809][T13104] ? proc_fail_nth_write+0x213/0x290 [ 2583.699928][T13104] ? proc_fail_nth_read+0x220/0x220 [ 2583.704974][T13104] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2583.709909][T13104] ? vfs_write+0x9af/0x1050 [ 2583.714250][T13104] ? vmacache_update+0xb7/0x120 [ 2583.718936][T13104] kernel_clone+0x22d/0x990 [ 2583.723372][T13104] ? file_end_write+0x1b0/0x1b0 [ 2583.728050][T13104] ? __kasan_check_write+0x14/0x20 [ 2583.733004][T13104] ? create_io_thread+0x1e0/0x1e0 [ 2583.737858][T13104] ? __mutex_lock_slowpath+0x10/0x10 [ 2583.743064][T13104] __x64_sys_clone+0x289/0x310 [ 2583.747667][T13104] ? __do_sys_vfork+0x130/0x130 [ 2583.752364][T13104] ? debug_smp_processor_id+0x17/0x20 [ 2583.757558][T13104] do_syscall_64+0x44/0xd0 [ 2583.761809][T13104] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2583.767538][T13104] RIP: 0033:0x7fd2e6d030d9 [ 2583.771798][T13104] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2583.791324][T13104] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2583.799567][T13104] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2583.807375][T13104] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2583.815197][T13104] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2583.823016][T13104] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2583.830809][T13104] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2583.838623][T13104] 04:07:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x4}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x48000000}, 0x80) 04:07:04 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xff010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:04 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:04 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x14b, 0xe7, &(0x7f0000000700)="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", &(0x7f0000000240)=""/231, 0x800001, 0x0, 0xba, 0xf0, &(0x7f0000000180)="5c61b54bb5144cad5f5e4423cbc3da329a3b57576d0e3484ab0c2ecacbdb0a5c8b10590c4f6fd9710e8b86ae7dcc58118d712f85438b1c93b3c2d9c9cdeb6c4b5a1f7419cd8c6ebb2a7bac2cd47effa8e3d202dadf342e6ecf9d86f537063db663f43f023e5a6e6d7b0dd20c8175adccd8af69ec0f95fbce84ad753c118b715ddbacc7d7a530c29d0297eaa5c2b660c1b2cf7d4c9f33340845579dec2684600e02945a566d5ce3f77ffdf2d47d8d3b779034046937907de200bd", &(0x7f0000000880)="43ccb5ff76ef483f93ba8f07b81214c85e76f486554c13fab637259d1579cc1f2807d29ab9c6dfeac2aabbade6b041df8cb9b7ff582615545f8af0d162f8494b12c7b1c96556877688faa2fcdee35cc88bce55ea570d9908f16bbc7a41b303a888b17587e39740e24332e44a63092ff2136db2a19fc11ae5845a764e4d8b365ed7cdee2b2b8971fddebe650dfa13efda686f8eb410fa0da672dadb6a5e63e332875811a6c30a0b12530b59f60a1c2b5eff4aecdd193a747207be52e99d54e3985b2f00000000000000000000000000000087b15079941144733fbc5566cb926e2a02ebc6e9c16e7e2cbfea36df1e5ad2", 0x1, 0x81}, 0x48) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x0, 0x5, 0xfe, &(0x7f0000000400)="43ef7ce6ee", &(0x7f0000000440)=""/254, 0x40236c79, 0x0, 0x6a, 0x88, &(0x7f0000000540)="ab6686a9422e50906bb0b0d028aae8ccbf8426a96274da7c587a0bac8e5dbccb77ae321510c51d802d34ade00cae61580206ebeae21f46c9ed2f1d1447d9b65f8c1f2bc9962f652527a20d60c964b1dfbf4501e7eeb8a12b853f9bc057456fa19191846c6cdf9d48db96", &(0x7f00000005c0)="71ce75d216e4bcd08c3920348e7d22c6173c3aa06dc195bbf1875b2f27f71e445df9f7361be948874a8de0d527112a6bc56c3e37bb9e43a228ef68527ab4a65f86768c2eae0e92b59db71c165b812c7c688191cba82b575b7a4e49c0b7fd245105ab771eb184c77a2e102e6970a0c49480e65c5c646682a2fa28c02068089348af0254baa46982a5", 0x1, 0x80000000}, 0x48) syz_clone(0x26244900, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x14b, 0xe7, &(0x7f0000000700)="668eca940807bf9d04e402d93d83483cfc12e5d0c571003e73e07dc7deb6d42706d8c52eb724375da373c3ad35bbe09e89b2f1cefcfb0d1db554341e123c331f16b23d9c4e9bde9332f1d6963ecf824e3ee6bb6d0d113d8a91a7bcf2f8071edb186810e0736e2b42d271823a876b144357c8f7ae3fb4d3b459b89d339324125978d79b9190d88bab542c7f93266172544a3324bf9bf6489677ea5d63f87f95a5556e6736c7efd01dc3f488a478db750dee3e7ff5d2e5f55be96eb0ba8b3f07996327c659adbb36587fb7b1a29e74d0e56036883952f523ca1ee121c7f4e9fc4865f78eb2e8eea656434249e29a12eda115575d21b32749a8c907c389f32df935897044e67020a0397a35b66083199834f7fe5a8e6677e072b083df15def9fb3b682e451173739f90e2d5f57f72f3a6b8822b472e06d28f94d637c4d4f436b3f535679342e3fda613e58641", &(0x7f0000000240)=""/231, 0x800001, 0x0, 0xba, 0xf0, &(0x7f0000000180)="5c61b54bb5144cad5f5e4423cbc3da329a3b57576d0e3484ab0c2ecacbdb0a5c8b10590c4f6fd9710e8b86ae7dcc58118d712f85438b1c93b3c2d9c9cdeb6c4b5a1f7419cd8c6ebb2a7bac2cd47effa8e3d202dadf342e6ecf9d86f537063db663f43f023e5a6e6d7b0dd20c8175adccd8af69ec0f95fbce84ad753c118b715ddbacc7d7a530c29d0297eaa5c2b660c1b2cf7d4c9f33340845579dec2684600e02945a566d5ce3f77ffdf2d47d8d3b779034046937907de200bd", &(0x7f0000000880)="43ccb5ff76ef483f93ba8f07b81214c85e76f486554c13fab637259d1579cc1f2807d29ab9c6dfeac2aabbade6b041df8cb9b7ff582615545f8af0d162f8494b12c7b1c96556877688faa2fcdee35cc88bce55ea570d9908f16bbc7a41b303a888b17587e39740e24332e44a63092ff2136db2a19fc11ae5845a764e4d8b365ed7cdee2b2b8971fddebe650dfa13efda686f8eb410fa0da672dadb6a5e63e332875811a6c30a0b12530b59f60a1c2b5eff4aecdd193a747207be52e99d54e3985b2f00000000000000000000000000000087b15079941144733fbc5566cb926e2a02ebc6e9c16e7e2cbfea36df1e5ad2", 0x1, 0x81}, 0x48) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0x4) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x0, 0x5, 0xfe, &(0x7f0000000400)="43ef7ce6ee", &(0x7f0000000440)=""/254, 0x40236c79, 0x0, 0x6a, 0x88, &(0x7f0000000540)="ab6686a9422e50906bb0b0d028aae8ccbf8426a96274da7c587a0bac8e5dbccb77ae321510c51d802d34ade00cae61580206ebeae21f46c9ed2f1d1447d9b65f8c1f2bc9962f652527a20d60c964b1dfbf4501e7eeb8a12b853f9bc057456fa19191846c6cdf9d48db96", &(0x7f00000005c0)="71ce75d216e4bcd08c3920348e7d22c6173c3aa06dc195bbf1875b2f27f71e445df9f7361be948874a8de0d527112a6bc56c3e37bb9e43a228ef68527ab4a65f86768c2eae0e92b59db71c165b812c7c688191cba82b575b7a4e49c0b7fd245105ab771eb184c77a2e102e6970a0c49480e65c5c646682a2fa28c02068089348af0254baa46982a5", 0x1, 0x80000000}, 0x48) (async) syz_clone(0x26244900, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 04:07:04 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 57) 04:07:04 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xff020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x4c000000}, 0x80) 04:07:04 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x14b, 0xe7, &(0x7f0000000700)="668eca940807bf9d04e402d93d83483cfc12e5d0c571003e73e07dc7deb6d42706d8c52eb724375da373c3ad35bbe09e89b2f1cefcfb0d1db554341e123c331f16b23d9c4e9bde9332f1d6963ecf824e3ee6bb6d0d113d8a91a7bcf2f8071edb186810e0736e2b42d271823a876b144357c8f7ae3fb4d3b459b89d339324125978d79b9190d88bab542c7f93266172544a3324bf9bf6489677ea5d63f87f95a5556e6736c7efd01dc3f488a478db750dee3e7ff5d2e5f55be96eb0ba8b3f07996327c659adbb36587fb7b1a29e74d0e56036883952f523ca1ee121c7f4e9fc4865f78eb2e8eea656434249e29a12eda115575d21b32749a8c907c389f32df935897044e67020a0397a35b66083199834f7fe5a8e6677e072b083df15def9fb3b682e451173739f90e2d5f57f72f3a6b8822b472e06d28f94d637c4d4f436b3f535679342e3fda613e58641", &(0x7f0000000240)=""/231, 0x800001, 0x0, 0xba, 0xf0, &(0x7f0000000180)="5c61b54bb5144cad5f5e4423cbc3da329a3b57576d0e3484ab0c2ecacbdb0a5c8b10590c4f6fd9710e8b86ae7dcc58118d712f85438b1c93b3c2d9c9cdeb6c4b5a1f7419cd8c6ebb2a7bac2cd47effa8e3d202dadf342e6ecf9d86f537063db663f43f023e5a6e6d7b0dd20c8175adccd8af69ec0f95fbce84ad753c118b715ddbacc7d7a530c29d0297eaa5c2b660c1b2cf7d4c9f33340845579dec2684600e02945a566d5ce3f77ffdf2d47d8d3b779034046937907de200bd", &(0x7f0000000880)="43ccb5ff76ef483f93ba8f07b81214c85e76f486554c13fab637259d1579cc1f2807d29ab9c6dfeac2aabbade6b041df8cb9b7ff582615545f8af0d162f8494b12c7b1c96556877688faa2fcdee35cc88bce55ea570d9908f16bbc7a41b303a888b17587e39740e24332e44a63092ff2136db2a19fc11ae5845a764e4d8b365ed7cdee2b2b8971fddebe650dfa13efda686f8eb410fa0da672dadb6a5e63e332875811a6c30a0b12530b59f60a1c2b5eff4aecdd193a747207be52e99d54e3985b2f00000000000000000000000000000087b15079941144733fbc5566cb926e2a02ebc6e9c16e7e2cbfea36df1e5ad2", 0x1, 0x81}, 0x48) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x0, 0x5, 0xfe, &(0x7f0000000400)="43ef7ce6ee", &(0x7f0000000440)=""/254, 0x40236c79, 0x0, 0x6a, 0x88, &(0x7f0000000540)="ab6686a9422e50906bb0b0d028aae8ccbf8426a96274da7c587a0bac8e5dbccb77ae321510c51d802d34ade00cae61580206ebeae21f46c9ed2f1d1447d9b65f8c1f2bc9962f652527a20d60c964b1dfbf4501e7eeb8a12b853f9bc057456fa19191846c6cdf9d48db96", &(0x7f00000005c0)="71ce75d216e4bcd08c3920348e7d22c6173c3aa06dc195bbf1875b2f27f71e445df9f7361be948874a8de0d527112a6bc56c3e37bb9e43a228ef68527ab4a65f86768c2eae0e92b59db71c165b812c7c688191cba82b575b7a4e49c0b7fd245105ab771eb184c77a2e102e6970a0c49480e65c5c646682a2fa28c02068089348af0254baa46982a5", 0x1, 0x80000000}, 0x48) syz_clone(0x26244900, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x14b, 0xe7, &(0x7f0000000700)="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", &(0x7f0000000240)=""/231, 0x800001, 0x0, 0xba, 0xf0, &(0x7f0000000180)="5c61b54bb5144cad5f5e4423cbc3da329a3b57576d0e3484ab0c2ecacbdb0a5c8b10590c4f6fd9710e8b86ae7dcc58118d712f85438b1c93b3c2d9c9cdeb6c4b5a1f7419cd8c6ebb2a7bac2cd47effa8e3d202dadf342e6ecf9d86f537063db663f43f023e5a6e6d7b0dd20c8175adccd8af69ec0f95fbce84ad753c118b715ddbacc7d7a530c29d0297eaa5c2b660c1b2cf7d4c9f33340845579dec2684600e02945a566d5ce3f77ffdf2d47d8d3b779034046937907de200bd", &(0x7f0000000880)="43ccb5ff76ef483f93ba8f07b81214c85e76f486554c13fab637259d1579cc1f2807d29ab9c6dfeac2aabbade6b041df8cb9b7ff582615545f8af0d162f8494b12c7b1c96556877688faa2fcdee35cc88bce55ea570d9908f16bbc7a41b303a888b17587e39740e24332e44a63092ff2136db2a19fc11ae5845a764e4d8b365ed7cdee2b2b8971fddebe650dfa13efda686f8eb410fa0da672dadb6a5e63e332875811a6c30a0b12530b59f60a1c2b5eff4aecdd193a747207be52e99d54e3985b2f00000000000000000000000000000087b15079941144733fbc5566cb926e2a02ebc6e9c16e7e2cbfea36df1e5ad2", 0x1, 0x81}, 0x48) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0x4) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x0, 0x5, 0xfe, &(0x7f0000000400)="43ef7ce6ee", &(0x7f0000000440)=""/254, 0x40236c79, 0x0, 0x6a, 0x88, &(0x7f0000000540)="ab6686a9422e50906bb0b0d028aae8ccbf8426a96274da7c587a0bac8e5dbccb77ae321510c51d802d34ade00cae61580206ebeae21f46c9ed2f1d1447d9b65f8c1f2bc9962f652527a20d60c964b1dfbf4501e7eeb8a12b853f9bc057456fa19191846c6cdf9d48db96", &(0x7f00000005c0)="71ce75d216e4bcd08c3920348e7d22c6173c3aa06dc195bbf1875b2f27f71e445df9f7361be948874a8de0d527112a6bc56c3e37bb9e43a228ef68527ab4a65f86768c2eae0e92b59db71c165b812c7c688191cba82b575b7a4e49c0b7fd245105ab771eb184c77a2e102e6970a0c49480e65c5c646682a2fa28c02068089348af0254baa46982a5", 0x1, 0x80000000}, 0x48) (async) syz_clone(0x26244900, 0x0, 0x0, 0x0, 0x0, 0x0) (async) [ 2583.919034][T13132] FAULT_INJECTION: forcing a failure. [ 2583.919034][T13132] name failslab, interval 1, probability 0, space 0, times 0 [ 2583.934597][T13132] CPU: 0 PID: 13132 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2583.945019][T13132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2583.954910][T13132] Call Trace: [ 2583.958039][T13132] [ 2583.960818][T13132] dump_stack_lvl+0x151/0x1b7 [ 2583.965331][T13132] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2583.970631][T13132] dump_stack+0x15/0x17 [ 2583.974612][T13132] should_fail+0x3c0/0x510 [ 2583.979026][T13132] __should_failslab+0x9f/0xe0 [ 2583.983616][T13132] should_failslab+0x9/0x20 [ 2583.987987][T13132] kmem_cache_alloc+0x4f/0x2f0 [ 2583.992562][T13132] ? vm_area_dup+0x26/0x1d0 [ 2583.996895][T13132] vm_area_dup+0x26/0x1d0 [ 2584.001058][T13132] dup_mmap+0x6b8/0xea0 [ 2584.005218][T13132] ? __delayed_free_task+0x20/0x20 [ 2584.010148][T13132] ? mm_init+0x807/0x960 [ 2584.014220][T13132] dup_mm+0x91/0x330 [ 2584.017966][T13132] copy_mm+0x108/0x1b0 [ 2584.021865][T13132] copy_process+0x1295/0x3250 [ 2584.026376][T13132] ? proc_fail_nth_write+0x213/0x290 [ 2584.031490][T13132] ? proc_fail_nth_read+0x220/0x220 [ 2584.036520][T13132] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2584.041556][T13132] ? vfs_write+0x9af/0x1050 [ 2584.045895][T13132] ? vmacache_update+0xb7/0x120 [ 2584.050597][T13132] kernel_clone+0x22d/0x990 [ 2584.054919][T13132] ? file_end_write+0x1b0/0x1b0 [ 2584.059604][T13132] ? __kasan_check_write+0x14/0x20 [ 2584.064560][T13132] ? create_io_thread+0x1e0/0x1e0 [ 2584.069413][T13132] ? __mutex_lock_slowpath+0x10/0x10 [ 2584.075154][T13132] __x64_sys_clone+0x289/0x310 [ 2584.079739][T13132] ? __do_sys_vfork+0x130/0x130 [ 2584.084435][T13132] ? debug_smp_processor_id+0x17/0x20 [ 2584.089636][T13132] do_syscall_64+0x44/0xd0 [ 2584.093888][T13132] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2584.099613][T13132] RIP: 0033:0x7fd2e6d030d9 [ 2584.103881][T13132] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2584.123745][T13132] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2584.131937][T13132] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2584.139751][T13132] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2584.147649][T13132] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2584.155465][T13132] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 04:07:04 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x50, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x64000000}, 0x80) 04:07:04 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xff030000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2584.163285][T13132] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2584.171174][T13132] 04:07:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x5}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:04 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xff040000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:04 executing program 1: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x20, &(0x7f0000000240)={&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200)=""/33, 0x21}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.io_serviced\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x19, 0x9, 0x1d, 0x2d07, 0x20, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r3]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r6]}, 0x80) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f00000004c0)='GPL\x00', 0xea, 0xeb, &(0x7f0000000080)=""/219, 0x40f00, 0x14, '\x00', 0x0, 0x13, r1, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x2000000d, 0x8001}, 0xfffffe6a, 0x0, r4, 0x0, &(0x7f0000000580)=[r6, r8, r7]}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000480)={@map=r5, r1, 0x1, 0x4, r1}, 0x14) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r10]}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000008c0)={&(0x7f00000005c0)="a22d2b90ed26bc02a45348fb14ef2c778ee0b2d9ac85cfac457432a73d461a6baee69273f6804f060e51fea14fae009e097f4cec0ab142db92795c98e14052c7ce84a2c68e0a00040a475d0ffaf22dae3119b18df0749e4485d95871b7d0504f1032fa5c1ccc38da91fd6bff8f005e15081e5c66d1", &(0x7f0000000640)=""/210, &(0x7f0000000740)="de2f6968c00c41f12df08e31efb5bc2b0a8251311628e0c4666c4462a92e1563abd449243714d8a28ee1f79a0406e21d73c06b046a3595188104d4c4db57388a582c5c38874fdf62d08db4fe6f204c64cddcaab6308aa5f56f63e3447e4548974226cfd8251d53462bf1f45e77c8df75ff40d39664a8323c6e52ad4f0d4978db43ecfdbeff3ad7e79a2bade45c52d188c54041b29cb9595fb4370ad62acac6748659931f99f3db9c306ae8f81c506964cc5ad716bfedc346b8d235f7d2b19571dcf2ea4705cc07e5bee5567f087bf0204473e601ef5565b57914d4207f135e2962a7", &(0x7f0000000840)="44c38d5b8f1f6022400f42aaf351d5bd0950dbb75f86b4e1428987355d4042a17d30515e75845db48a29e9b3db545ab725c4f834fe7134def2af25bd48b8ca0004ce444a97ad02d086d3aaf668ff059e40d5df6e1bc4450eb3b836bf7a37c44fc7222881efced9c5aa9fbb93f8d9c2b94f99", 0x80000001, r10}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x3, &(0x7f0000000000)=@raw=[@generic={0x1, 0xd, 0xf, 0x6, 0xfff}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xbc, &(0x7f0000000080)=""/188, 0x40f00, 0x10, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x4, 0x27234f7a, 0x7}, 0x10, r0, r1, 0x0, &(0x7f00000003c0)=[0x1, r2, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, r3, 0xffffffffffffffff, r9]}, 0x80) 04:07:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x68000000}, 0x80) 04:07:04 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 58) 04:07:04 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x71, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:04 executing program 1: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x20, &(0x7f0000000240)={&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200)=""/33, 0x21}}, 0x10) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.io_serviced\x00', 0x0, 0x0) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x19, 0x9, 0x1d, 0x2d07, 0x20, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r3]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r6]}, 0x80) (async) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f00000004c0)='GPL\x00', 0xea, 0xeb, &(0x7f0000000080)=""/219, 0x40f00, 0x14, '\x00', 0x0, 0x13, r1, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x2000000d, 0x8001}, 0xfffffe6a, 0x0, r4, 0x0, &(0x7f0000000580)=[r6, r8, r7]}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000480)={@map=r5, r1, 0x1, 0x4, r1}, 0x14) (async) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) (async, rerun: 32) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r10]}, 0x80) (async) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000008c0)={&(0x7f00000005c0)="a22d2b90ed26bc02a45348fb14ef2c778ee0b2d9ac85cfac457432a73d461a6baee69273f6804f060e51fea14fae009e097f4cec0ab142db92795c98e14052c7ce84a2c68e0a00040a475d0ffaf22dae3119b18df0749e4485d95871b7d0504f1032fa5c1ccc38da91fd6bff8f005e15081e5c66d1", &(0x7f0000000640)=""/210, &(0x7f0000000740)="de2f6968c00c41f12df08e31efb5bc2b0a8251311628e0c4666c4462a92e1563abd449243714d8a28ee1f79a0406e21d73c06b046a3595188104d4c4db57388a582c5c38874fdf62d08db4fe6f204c64cddcaab6308aa5f56f63e3447e4548974226cfd8251d53462bf1f45e77c8df75ff40d39664a8323c6e52ad4f0d4978db43ecfdbeff3ad7e79a2bade45c52d188c54041b29cb9595fb4370ad62acac6748659931f99f3db9c306ae8f81c506964cc5ad716bfedc346b8d235f7d2b19571dcf2ea4705cc07e5bee5567f087bf0204473e601ef5565b57914d4207f135e2962a7", &(0x7f0000000840)="44c38d5b8f1f6022400f42aaf351d5bd0950dbb75f86b4e1428987355d4042a17d30515e75845db48a29e9b3db545ab725c4f834fe7134def2af25bd48b8ca0004ce444a97ad02d086d3aaf668ff059e40d5df6e1bc4450eb3b836bf7a37c44fc7222881efced9c5aa9fbb93f8d9c2b94f99", 0x80000001, r10}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x3, &(0x7f0000000000)=@raw=[@generic={0x1, 0xd, 0xf, 0x6, 0xfff}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xbc, &(0x7f0000000080)=""/188, 0x40f00, 0x10, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x4, 0x27234f7a, 0x7}, 0x10, r0, r1, 0x0, &(0x7f00000003c0)=[0x1, r2, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, r3, 0xffffffffffffffff, r9]}, 0x80) 04:07:04 executing program 1: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x20, &(0x7f0000000240)={&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200)=""/33, 0x21}}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.io_serviced\x00', 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x19, 0x9, 0x1d, 0x2d07, 0x20, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r3]}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r6]}, 0x80) (async) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f00000004c0)='GPL\x00', 0xea, 0xeb, &(0x7f0000000080)=""/219, 0x40f00, 0x14, '\x00', 0x0, 0x13, r1, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x2000000d, 0x8001}, 0xfffffe6a, 0x0, r4, 0x0, &(0x7f0000000580)=[r6, r8, r7]}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000480)={@map=r5, r1, 0x1, 0x4, r1}, 0x14) (async) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r10]}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000008c0)={&(0x7f00000005c0)="a22d2b90ed26bc02a45348fb14ef2c778ee0b2d9ac85cfac457432a73d461a6baee69273f6804f060e51fea14fae009e097f4cec0ab142db92795c98e14052c7ce84a2c68e0a00040a475d0ffaf22dae3119b18df0749e4485d95871b7d0504f1032fa5c1ccc38da91fd6bff8f005e15081e5c66d1", &(0x7f0000000640)=""/210, &(0x7f0000000740)="de2f6968c00c41f12df08e31efb5bc2b0a8251311628e0c4666c4462a92e1563abd449243714d8a28ee1f79a0406e21d73c06b046a3595188104d4c4db57388a582c5c38874fdf62d08db4fe6f204c64cddcaab6308aa5f56f63e3447e4548974226cfd8251d53462bf1f45e77c8df75ff40d39664a8323c6e52ad4f0d4978db43ecfdbeff3ad7e79a2bade45c52d188c54041b29cb9595fb4370ad62acac6748659931f99f3db9c306ae8f81c506964cc5ad716bfedc346b8d235f7d2b19571dcf2ea4705cc07e5bee5567f087bf0204473e601ef5565b57914d4207f135e2962a7", &(0x7f0000000840)="44c38d5b8f1f6022400f42aaf351d5bd0950dbb75f86b4e1428987355d4042a17d30515e75845db48a29e9b3db545ab725c4f834fe7134def2af25bd48b8ca0004ce444a97ad02d086d3aaf668ff059e40d5df6e1bc4450eb3b836bf7a37c44fc7222881efced9c5aa9fbb93f8d9c2b94f99", 0x80000001, r10}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x3, &(0x7f0000000000)=@raw=[@generic={0x1, 0xd, 0xf, 0x6, 0xfff}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xbc, &(0x7f0000000080)=""/188, 0x40f00, 0x10, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x4, 0x27234f7a, 0x7}, 0x10, r0, r1, 0x0, &(0x7f00000003c0)=[0x1, r2, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, r3, 0xffffffffffffffff, r9]}, 0x80) [ 2584.249441][T13162] FAULT_INJECTION: forcing a failure. [ 2584.249441][T13162] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2584.267097][T13162] CPU: 1 PID: 13162 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2584.277353][T13162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2584.287335][T13162] Call Trace: [ 2584.290459][T13162] [ 2584.293244][T13162] dump_stack_lvl+0x151/0x1b7 [ 2584.297744][T13162] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2584.303126][T13162] ? __switch_to+0x617/0x1170 [ 2584.307770][T13162] ? native_set_ldt+0x360/0x360 [ 2584.312513][T13162] dump_stack+0x15/0x17 [ 2584.316597][T13162] should_fail+0x3c0/0x510 [ 2584.320842][T13162] should_fail_alloc_page+0x58/0x70 [ 2584.325875][T13162] __alloc_pages+0x1de/0x7c0 [ 2584.330313][T13162] ? __count_vm_events+0x30/0x30 [ 2584.335074][T13162] ? __this_cpu_preempt_check+0x13/0x20 [ 2584.340455][T13162] pte_alloc_one+0x73/0x1b0 [ 2584.344798][T13162] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2584.349831][T13162] __pte_alloc+0x86/0x350 [ 2584.354428][T13162] ? free_pgtables+0x210/0x210 [ 2584.359034][T13162] ? _raw_spin_lock+0xa3/0x1b0 [ 2584.363714][T13162] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2584.369446][T13162] ? __kernel_text_address+0x9a/0x110 [ 2584.374830][T13162] copy_pte_range+0x1b1f/0x20b0 [ 2584.379601][T13162] ? __kunmap_atomic+0x80/0x80 [ 2584.384207][T13162] ? __kasan_slab_alloc+0xc4/0xe0 [ 2584.389322][T13162] ? __kasan_slab_alloc+0xb2/0xe0 [ 2584.394291][T13162] ? kmem_cache_alloc+0x189/0x2f0 [ 2584.399233][T13162] ? vm_area_dup+0x26/0x1d0 [ 2584.403560][T13162] ? dup_mmap+0x6b8/0xea0 [ 2584.407713][T13162] ? dup_mm+0x91/0x330 [ 2584.411644][T13162] ? copy_mm+0x108/0x1b0 [ 2584.415693][T13162] ? copy_process+0x1295/0x3250 [ 2584.420381][T13162] ? kernel_clone+0x22d/0x990 [ 2584.424895][T13162] ? __x64_sys_clone+0x289/0x310 [ 2584.429671][T13162] ? do_syscall_64+0x44/0xd0 [ 2584.434097][T13162] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2584.440186][T13162] copy_page_range+0xc1e/0x1090 [ 2584.444950][T13162] ? pfn_valid+0x1e0/0x1e0 [ 2584.449654][T13162] dup_mmap+0x99f/0xea0 [ 2584.453650][T13162] ? __delayed_free_task+0x20/0x20 [ 2584.458597][T13162] ? mm_init+0x807/0x960 [ 2584.462675][T13162] dup_mm+0x91/0x330 [ 2584.466392][T13162] copy_mm+0x108/0x1b0 [ 2584.470470][T13162] copy_process+0x1295/0x3250 [ 2584.474981][T13162] ? proc_fail_nth_write+0x213/0x290 [ 2584.480115][T13162] ? proc_fail_nth_read+0x220/0x220 [ 2584.485167][T13162] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2584.490091][T13162] ? vfs_write+0x9af/0x1050 [ 2584.494425][T13162] ? vmacache_update+0xb7/0x120 [ 2584.499116][T13162] kernel_clone+0x22d/0x990 [ 2584.503470][T13162] ? file_end_write+0x1b0/0x1b0 [ 2584.508147][T13162] ? __kasan_check_write+0x14/0x20 [ 2584.513192][T13162] ? create_io_thread+0x1e0/0x1e0 [ 2584.518137][T13162] ? __mutex_lock_slowpath+0x10/0x10 [ 2584.523375][T13162] __x64_sys_clone+0x289/0x310 [ 2584.528298][T13162] ? __do_sys_vfork+0x130/0x130 [ 2584.533086][T13162] ? debug_smp_processor_id+0x17/0x20 [ 2584.538275][T13162] do_syscall_64+0x44/0xd0 [ 2584.542530][T13162] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2584.548259][T13162] RIP: 0033:0x7fd2e6d030d9 [ 2584.552523][T13162] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2584.571957][T13162] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2584.580196][T13162] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2584.588007][T13162] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 04:07:04 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x200000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x6c000000}, 0x80) 04:07:04 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x259, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:04 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x4, 0x12) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'hugetlb'}, {0x56, 'net'}, {0x2d, 'net_prio'}]}, 0x18) [ 2584.595815][T13162] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2584.603641][T13162] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2584.611439][T13162] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2584.619253][T13162] 04:07:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x7}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:04 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x800000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:04 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 59) 04:07:04 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x4, 0x12) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'hugetlb'}, {0x56, 'net'}, {0x2d, 'net_prio'}]}, 0x18) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) (async) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$cgroup_int(r0, &(0x7f0000000040)=0x4, 0x12) (async) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'hugetlb'}, {0x56, 'net'}, {0x2d, 'net_prio'}]}, 0x18) (async) 04:07:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x74000000}, 0x80) 04:07:04 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x27d, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:04 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1000001000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:04 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) (async) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x4, 0x12) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'hugetlb'}, {0x56, 'net'}, {0x2d, 'net_prio'}]}, 0x18) 04:07:04 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:05 executing program 1: syz_clone(0x979c9600, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) 04:07:05 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2584.713389][T13195] FAULT_INJECTION: forcing a failure. [ 2584.713389][T13195] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2584.727108][T13195] CPU: 1 PID: 13195 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2584.737351][T13195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2584.747250][T13195] Call Trace: [ 2584.750368][T13195] [ 2584.753147][T13195] dump_stack_lvl+0x151/0x1b7 [ 2584.757662][T13195] ? bfq_pos_tree_add_move+0x43e/0x43e 04:07:05 executing program 1: syz_clone(0x979c9600, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) syz_clone(0x979c9600, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) (async) gettid() (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) (async) [ 2584.762960][T13195] dump_stack+0x15/0x17 [ 2584.766946][T13195] should_fail+0x3c0/0x510 [ 2584.771207][T13195] should_fail_alloc_page+0x58/0x70 [ 2584.776234][T13195] __alloc_pages+0x1de/0x7c0 [ 2584.780663][T13195] ? __count_vm_events+0x30/0x30 [ 2584.785435][T13195] ? __this_cpu_preempt_check+0x13/0x20 [ 2584.790817][T13195] ? __mod_node_page_state+0xac/0xf0 [ 2584.795940][T13195] pte_alloc_one+0x73/0x1b0 [ 2584.800277][T13195] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2584.805326][T13195] __pte_alloc+0x86/0x350 [ 2584.809478][T13195] ? free_pgtables+0x210/0x210 [ 2584.814103][T13195] ? _raw_spin_lock+0xa3/0x1b0 [ 2584.818678][T13195] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2584.823883][T13195] ? __kernel_text_address+0x9a/0x110 [ 2584.829092][T13195] copy_pte_range+0x1b1f/0x20b0 [ 2584.833855][T13195] ? __kunmap_atomic+0x80/0x80 [ 2584.838375][T13195] ? __kasan_slab_alloc+0xc4/0xe0 [ 2584.843240][T13195] ? __kasan_slab_alloc+0xb2/0xe0 [ 2584.848101][T13195] ? kmem_cache_alloc+0x189/0x2f0 [ 2584.852957][T13195] ? vm_area_dup+0x26/0x1d0 [ 2584.857298][T13195] ? dup_mmap+0x6b8/0xea0 [ 2584.861462][T13195] ? dup_mm+0x91/0x330 [ 2584.865368][T13195] ? copy_mm+0x108/0x1b0 [ 2584.869451][T13195] ? copy_process+0x1295/0x3250 [ 2584.874148][T13195] ? kernel_clone+0x22d/0x990 [ 2584.878647][T13195] ? __x64_sys_clone+0x289/0x310 [ 2584.883419][T13195] ? do_syscall_64+0x44/0xd0 [ 2584.888045][T13195] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2584.893952][T13195] copy_page_range+0xc1e/0x1090 [ 2584.898724][T13195] ? pfn_valid+0x1e0/0x1e0 [ 2584.902990][T13195] dup_mmap+0x99f/0xea0 [ 2584.906974][T13195] ? __delayed_free_task+0x20/0x20 [ 2584.912008][T13195] ? mm_init+0x807/0x960 [ 2584.916165][T13195] dup_mm+0x91/0x330 [ 2584.919979][T13195] copy_mm+0x108/0x1b0 [ 2584.923886][T13195] copy_process+0x1295/0x3250 [ 2584.928399][T13195] ? proc_fail_nth_write+0x213/0x290 [ 2584.933520][T13195] ? proc_fail_nth_read+0x220/0x220 [ 2584.938553][T13195] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2584.943676][T13195] ? vfs_write+0x9af/0x1050 [ 2584.948072][T13195] ? vmacache_update+0xb7/0x120 [ 2584.952713][T13195] kernel_clone+0x22d/0x990 [ 2584.957030][T13195] ? file_end_write+0x1b0/0x1b0 [ 2584.961741][T13195] ? __kasan_check_write+0x14/0x20 [ 2584.966676][T13195] ? create_io_thread+0x1e0/0x1e0 [ 2584.971520][T13195] ? __mutex_lock_slowpath+0x10/0x10 [ 2584.976841][T13195] __x64_sys_clone+0x289/0x310 [ 2584.981416][T13195] ? __do_sys_vfork+0x130/0x130 [ 2584.986102][T13195] ? debug_smp_processor_id+0x17/0x20 [ 2584.991309][T13195] do_syscall_64+0x44/0xd0 [ 2584.995572][T13195] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2585.001309][T13195] RIP: 0033:0x7fd2e6d030d9 [ 2585.005569][T13195] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2585.024990][T13195] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2585.033669][T13195] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2585.041473][T13195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2585.049286][T13195] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2585.057104][T13195] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 04:07:05 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x8}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x7a000000}, 0x80) 04:07:05 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x300, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:05 executing program 1: syz_clone(0x979c9600, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) (async) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) 04:07:05 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 60) [ 2585.064992][T13195] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2585.072810][T13195] 04:07:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0x99030000}, 0x80) 04:07:05 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:05 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) gettid() gettid() r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r1, 0x0, 0x7, &(0x7f0000000040)=',:{+}[\x00'}, 0x30) 04:07:05 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2585.134147][T13237] FAULT_INJECTION: forcing a failure. [ 2585.134147][T13237] name failslab, interval 1, probability 0, space 0, times 0 [ 2585.163834][T13237] CPU: 0 PID: 13237 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2585.173918][T13237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2585.183806][T13237] Call Trace: [ 2585.186941][T13237] [ 2585.189738][T13237] dump_stack_lvl+0x151/0x1b7 [ 2585.194222][T13237] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2585.199516][T13237] dump_stack+0x15/0x17 [ 2585.203518][T13237] should_fail+0x3c0/0x510 [ 2585.207784][T13237] __should_failslab+0x9f/0xe0 [ 2585.212626][T13237] should_failslab+0x9/0x20 [ 2585.216959][T13237] kmem_cache_alloc+0x4f/0x2f0 [ 2585.221555][T13237] ? vm_area_dup+0x26/0x1d0 [ 2585.225895][T13237] ? __kasan_check_read+0x11/0x20 [ 2585.230760][T13237] vm_area_dup+0x26/0x1d0 [ 2585.234940][T13237] dup_mmap+0x6b8/0xea0 [ 2585.238913][T13237] ? __delayed_free_task+0x20/0x20 [ 2585.243884][T13237] ? mm_init+0x807/0x960 [ 2585.247950][T13237] dup_mm+0x91/0x330 [ 2585.251675][T13237] copy_mm+0x108/0x1b0 [ 2585.255591][T13237] copy_process+0x1295/0x3250 [ 2585.260090][T13237] ? proc_fail_nth_write+0x213/0x290 [ 2585.265599][T13237] ? proc_fail_nth_read+0x220/0x220 [ 2585.270621][T13237] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2585.275552][T13237] ? vfs_write+0x9af/0x1050 [ 2585.279925][T13237] ? vmacache_update+0xb7/0x120 [ 2585.284591][T13237] kernel_clone+0x22d/0x990 [ 2585.289044][T13237] ? file_end_write+0x1b0/0x1b0 [ 2585.293733][T13237] ? __kasan_check_write+0x14/0x20 [ 2585.298771][T13237] ? create_io_thread+0x1e0/0x1e0 [ 2585.303628][T13237] ? __mutex_lock_slowpath+0x10/0x10 [ 2585.308745][T13237] __x64_sys_clone+0x289/0x310 [ 2585.313345][T13237] ? __do_sys_vfork+0x130/0x130 [ 2585.318100][T13237] ? debug_smp_processor_id+0x17/0x20 [ 2585.323848][T13237] do_syscall_64+0x44/0xd0 [ 2585.328107][T13237] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2585.334093][T13237] RIP: 0033:0x7fd2e6d030d9 [ 2585.338344][T13237] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2585.357962][T13237] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2585.366399][T13237] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2585.374212][T13237] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 04:07:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xc9c51a00}, 0x80) 04:07:05 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) gettid() (async) gettid() r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r1, 0x0, 0x7, &(0x7f0000000040)=',:{+}[\x00'}, 0x30) [ 2585.382014][T13237] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2585.390171][T13237] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2585.397987][T13237] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2585.405851][T13237] 04:07:05 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x10}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:05 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:05 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) gettid() (async, rerun: 32) gettid() (async, rerun: 64) r0 = gettid() (rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r1, 0x0, 0x7, &(0x7f0000000040)=',:{+}[\x00'}, 0x30) 04:07:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xcc030000}, 0x80) 04:07:05 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 61) 04:07:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x3c5, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:05 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xf4000000}, 0x80) 04:07:05 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x10000010000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10, 0x0, 0x0, 0xff000000}, 0x80) [ 2585.520889][T13269] FAULT_INJECTION: forcing a failure. [ 2585.520889][T13269] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:07:05 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x40000100000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x41) [ 2585.563212][T13269] CPU: 0 PID: 13269 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2585.573303][T13269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2585.583193][T13269] Call Trace: [ 2585.586316][T13269] [ 2585.589091][T13269] dump_stack_lvl+0x151/0x1b7 [ 2585.593607][T13269] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2585.598902][T13269] dump_stack+0x15/0x17 [ 2585.602893][T13269] should_fail+0x3c0/0x510 [ 2585.607149][T13269] should_fail_alloc_page+0x58/0x70 [ 2585.612184][T13269] __alloc_pages+0x1de/0x7c0 [ 2585.616605][T13269] ? __count_vm_events+0x30/0x30 [ 2585.621466][T13269] ? __this_cpu_preempt_check+0x13/0x20 [ 2585.626845][T13269] ? __mod_node_page_state+0xac/0xf0 [ 2585.631986][T13269] pte_alloc_one+0x73/0x1b0 [ 2585.636308][T13269] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2585.641474][T13269] __pte_alloc+0x86/0x350 [ 2585.645682][T13269] ? free_pgtables+0x210/0x210 [ 2585.650387][T13269] ? _raw_spin_lock+0xa3/0x1b0 [ 2585.655068][T13269] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2585.660302][T13269] ? __kernel_text_address+0x9a/0x110 [ 2585.665483][T13269] copy_pte_range+0x1b1f/0x20b0 [ 2585.670175][T13269] ? __kunmap_atomic+0x80/0x80 [ 2585.674770][T13269] ? __kasan_slab_alloc+0xc4/0xe0 [ 2585.679625][T13269] ? __kasan_slab_alloc+0xb2/0xe0 [ 2585.684485][T13269] ? kmem_cache_alloc+0x189/0x2f0 [ 2585.689338][T13269] ? vm_area_dup+0x26/0x1d0 [ 2585.693676][T13269] ? dup_mmap+0x6b8/0xea0 [ 2585.697854][T13269] ? dup_mm+0x91/0x330 [ 2585.702024][T13269] ? copy_mm+0x108/0x1b0 [ 2585.706104][T13269] ? copy_process+0x1295/0x3250 [ 2585.710779][T13269] ? kernel_clone+0x22d/0x990 [ 2585.715299][T13269] ? __x64_sys_clone+0x289/0x310 [ 2585.720176][T13269] ? do_syscall_64+0x44/0xd0 [ 2585.724580][T13269] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2585.730493][T13269] copy_page_range+0xc1e/0x1090 [ 2585.735176][T13269] ? pfn_valid+0x1e0/0x1e0 [ 2585.739433][T13269] dup_mmap+0x99f/0xea0 [ 2585.743685][T13269] ? __delayed_free_task+0x20/0x20 [ 2585.748619][T13269] ? mm_init+0x807/0x960 [ 2585.752698][T13269] dup_mm+0x91/0x330 [ 2585.756432][T13269] copy_mm+0x108/0x1b0 [ 2585.760335][T13269] copy_process+0x1295/0x3250 [ 2585.764847][T13269] ? proc_fail_nth_write+0x213/0x290 [ 2585.769973][T13269] ? proc_fail_nth_read+0x220/0x220 [ 2585.775002][T13269] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2585.779948][T13269] ? vfs_write+0x9af/0x1050 [ 2585.784289][T13269] ? vmacache_update+0xb7/0x120 [ 2585.788988][T13269] kernel_clone+0x22d/0x990 [ 2585.793401][T13269] ? file_end_write+0x1b0/0x1b0 [ 2585.798088][T13269] ? __kasan_check_write+0x14/0x20 [ 2585.803036][T13269] ? create_io_thread+0x1e0/0x1e0 [ 2585.807983][T13269] ? __mutex_lock_slowpath+0x10/0x10 [ 2585.813104][T13269] __x64_sys_clone+0x289/0x310 [ 2585.817704][T13269] ? __do_sys_vfork+0x130/0x130 [ 2585.822481][T13269] ? debug_smp_processor_id+0x17/0x20 [ 2585.827719][T13269] do_syscall_64+0x44/0xd0 [ 2585.831939][T13269] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2585.837666][T13269] RIP: 0033:0x7fd2e6d030d9 [ 2585.841918][T13269] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2585.861359][T13269] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2585.869604][T13269] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2585.877416][T13269] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2585.885314][T13269] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2585.893123][T13269] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2585.901118][T13269] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2585.908930][T13269] 04:07:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x50}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:06 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x100000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x20003700) 04:07:06 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x3cc, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:06 executing program 1: syz_clone(0x4108400, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid\x00') 04:07:06 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62) 04:07:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000280)) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000000)=0x2) 04:07:06 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x101000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:06 executing program 1: syz_clone(0x4108400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid\x00') 04:07:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000280)) (async) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000000)=0x2) [ 2586.008927][T13333] FAULT_INJECTION: forcing a failure. [ 2586.008927][T13333] name failslab, interval 1, probability 0, space 0, times 0 [ 2586.028875][T13333] CPU: 1 PID: 13333 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2586.038960][T13333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2586.048864][T13333] Call Trace: [ 2586.051979][T13333] [ 2586.054765][T13333] dump_stack_lvl+0x151/0x1b7 [ 2586.059271][T13333] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2586.064568][T13333] dump_stack+0x15/0x17 [ 2586.068553][T13333] should_fail+0x3c0/0x510 [ 2586.072814][T13333] __should_failslab+0x9f/0xe0 [ 2586.077408][T13333] should_failslab+0x9/0x20 [ 2586.081748][T13333] kmem_cache_alloc+0x4f/0x2f0 [ 2586.086350][T13333] ? anon_vma_clone+0xa1/0x4f0 [ 2586.091074][T13333] anon_vma_clone+0xa1/0x4f0 [ 2586.095511][T13333] anon_vma_fork+0x91/0x4f0 [ 2586.099843][T13333] ? anon_vma_name+0x43/0x70 [ 2586.104260][T13333] dup_mmap+0x750/0xea0 [ 2586.108255][T13333] ? __delayed_free_task+0x20/0x20 [ 2586.113207][T13333] ? mm_init+0x807/0x960 [ 2586.117280][T13333] dup_mm+0x91/0x330 [ 2586.121012][T13333] copy_mm+0x108/0x1b0 [ 2586.124918][T13333] copy_process+0x1295/0x3250 [ 2586.129529][T13333] ? proc_fail_nth_write+0x213/0x290 [ 2586.134637][T13333] ? proc_fail_nth_read+0x220/0x220 [ 2586.139676][T13333] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2586.144625][T13333] ? vfs_write+0x9af/0x1050 [ 2586.148971][T13333] ? vmacache_update+0xb7/0x120 [ 2586.153650][T13333] kernel_clone+0x22d/0x990 [ 2586.158085][T13333] ? file_end_write+0x1b0/0x1b0 [ 2586.162762][T13333] ? __kasan_check_write+0x14/0x20 [ 2586.167701][T13333] ? create_io_thread+0x1e0/0x1e0 [ 2586.172563][T13333] ? __mutex_lock_slowpath+0x10/0x10 [ 2586.177683][T13333] __x64_sys_clone+0x289/0x310 [ 2586.182287][T13333] ? __do_sys_vfork+0x130/0x130 [ 2586.186968][T13333] ? debug_smp_processor_id+0x17/0x20 [ 2586.192178][T13333] do_syscall_64+0x44/0xd0 [ 2586.196432][T13333] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2586.202158][T13333] RIP: 0033:0x7fd2e6d030d9 [ 2586.206433][T13333] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2586.225856][T13333] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2586.234106][T13333] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2586.241995][T13333] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2586.249813][T13333] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 04:07:06 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x102000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:06 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x500, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2586.257741][T13333] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2586.265636][T13333] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2586.273446][T13333] 04:07:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x399}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000280)) (async) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000000)=0x2) 04:07:06 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x103000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:06 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) 04:07:06 executing program 1: syz_clone(0x4108400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid\x00') 04:07:06 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x700, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:06 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000080)=""/203, 0xcb}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/101, 0x65}, {&(0x7f0000000340)=""/93, 0x5d}, {&(0x7f00000003c0)=""/198, 0xc6}, {&(0x7f00000004c0)=""/104, 0x68}, {&(0x7f0000000540)=""/148, 0x94}], 0x8, &(0x7f0000000680)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}, 0x2) 04:07:06 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x104000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="186706001000000000000000000000000020000002000000"], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) [ 2586.374443][T13356] FAULT_INJECTION: forcing a failure. [ 2586.374443][T13356] name failslab, interval 1, probability 0, space 0, times 0 [ 2586.406660][T13356] CPU: 1 PID: 13356 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2586.416740][T13356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2586.426638][T13356] Call Trace: [ 2586.429761][T13356] [ 2586.432536][T13356] dump_stack_lvl+0x151/0x1b7 [ 2586.437052][T13356] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2586.442346][T13356] dump_stack+0x15/0x17 [ 2586.446428][T13356] should_fail+0x3c0/0x510 [ 2586.450671][T13356] __should_failslab+0x9f/0xe0 [ 2586.455278][T13356] should_failslab+0x9/0x20 [ 2586.459610][T13356] kmem_cache_alloc+0x4f/0x2f0 [ 2586.464211][T13356] ? vm_area_dup+0x26/0x1d0 [ 2586.468549][T13356] vm_area_dup+0x26/0x1d0 [ 2586.472719][T13356] dup_mmap+0x6b8/0xea0 [ 2586.476794][T13356] ? __delayed_free_task+0x20/0x20 [ 2586.482002][T13356] ? mm_init+0x807/0x960 [ 2586.486080][T13356] dup_mm+0x91/0x330 [ 2586.489918][T13356] copy_mm+0x108/0x1b0 [ 2586.493978][T13356] copy_process+0x1295/0x3250 [ 2586.498502][T13356] ? proc_fail_nth_write+0x213/0x290 [ 2586.503703][T13356] ? proc_fail_nth_read+0x220/0x220 [ 2586.508762][T13356] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2586.513784][T13356] ? vfs_write+0x9af/0x1050 [ 2586.518303][T13356] ? vmacache_update+0xb7/0x120 [ 2586.523147][T13356] kernel_clone+0x22d/0x990 [ 2586.527607][T13356] ? file_end_write+0x1b0/0x1b0 [ 2586.532625][T13356] ? __kasan_check_write+0x14/0x20 [ 2586.537662][T13356] ? create_io_thread+0x1e0/0x1e0 [ 2586.542528][T13356] ? __mutex_lock_slowpath+0x10/0x10 [ 2586.547728][T13356] __x64_sys_clone+0x289/0x310 [ 2586.552328][T13356] ? __do_sys_vfork+0x130/0x130 [ 2586.557015][T13356] ? debug_smp_processor_id+0x17/0x20 [ 2586.562233][T13356] do_syscall_64+0x44/0xd0 [ 2586.566562][T13356] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2586.572313][T13356] RIP: 0033:0x7fd2e6d030d9 [ 2586.576559][T13356] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2586.596089][T13356] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2586.604496][T13356] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2586.612308][T13356] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 04:07:06 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x1100, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:06 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x105000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:06 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x200000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2586.620129][T13356] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2586.628451][T13356] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2586.636263][T13356] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2586.644434][T13356] 04:07:07 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x3cc}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="186706001000000000000000000000000020000002000000"], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="186706001000000000000000000000000020000002000000"], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) (async) 04:07:07 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000080)=""/203, 0xcb}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/101, 0x65}, {&(0x7f0000000340)=""/93, 0x5d}, {&(0x7f00000003c0)=""/198, 0xc6}, {&(0x7f00000004c0)=""/104, 0x68}, {&(0x7f0000000540)=""/148, 0x94}], 0x8, &(0x7f0000000680)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}, 0x2) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x201000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x2000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:07 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) 04:07:07 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000080)=""/203, 0xcb}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/101, 0x65}, {&(0x7f0000000340)=""/93, 0x5d}, {&(0x7f00000003c0)=""/198, 0xc6}, {&(0x7f00000004c0)=""/104, 0x68}, {&(0x7f0000000540)=""/148, 0x94}], 0x8, &(0x7f0000000680)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}, 0x2) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x202000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="186706001000000000000000000000000020000002000000"], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="186706001000000000000000000000000020000002000000"], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58}, 0x10) (async) 04:07:07 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1f, 0x81, 0x7, 0x69, 0x0, 0xa1ce, 0x30000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xf255, 0x0, @perf_config_ext={0xff, 0x3}, 0x80008, 0x6, 0x5, 0x2, 0x0, 0xfffffffd, 0x2, 0x0, 0x1, 0x0, 0x427b}, r0, 0x3, r1, 0x1) [ 2586.773337][T13388] FAULT_INJECTION: forcing a failure. [ 2586.773337][T13388] name failslab, interval 1, probability 0, space 0, times 0 [ 2586.820492][T13388] CPU: 0 PID: 13388 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2586.830693][T13388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2586.840650][T13388] Call Trace: [ 2586.844114][T13388] [ 2586.846908][T13388] dump_stack_lvl+0x151/0x1b7 [ 2586.851404][T13388] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2586.856717][T13388] dump_stack+0x15/0x17 [ 2586.861129][T13388] should_fail+0x3c0/0x510 [ 2586.865377][T13388] __should_failslab+0x9f/0xe0 [ 2586.870095][T13388] should_failslab+0x9/0x20 [ 2586.874435][T13388] kmem_cache_alloc+0x4f/0x2f0 [ 2586.879029][T13388] ? vm_area_dup+0x26/0x1d0 [ 2586.883472][T13388] vm_area_dup+0x26/0x1d0 [ 2586.887637][T13388] dup_mmap+0x6b8/0xea0 [ 2586.891628][T13388] ? __delayed_free_task+0x20/0x20 [ 2586.896573][T13388] ? mm_init+0x807/0x960 [ 2586.900652][T13388] dup_mm+0x91/0x330 [ 2586.904386][T13388] copy_mm+0x108/0x1b0 [ 2586.908303][T13388] copy_process+0x1295/0x3250 [ 2586.912967][T13388] ? proc_fail_nth_write+0x213/0x290 [ 2586.918881][T13388] ? proc_fail_nth_read+0x220/0x220 [ 2586.924868][T13388] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2586.929901][T13388] ? vfs_write+0x9af/0x1050 [ 2586.934241][T13388] ? vmacache_update+0xb7/0x120 [ 2586.938930][T13388] kernel_clone+0x22d/0x990 [ 2586.943354][T13388] ? file_end_write+0x1b0/0x1b0 [ 2586.948304][T13388] ? __kasan_check_write+0x14/0x20 [ 2586.953249][T13388] ? create_io_thread+0x1e0/0x1e0 [ 2586.958111][T13388] ? __mutex_lock_slowpath+0x10/0x10 [ 2586.963235][T13388] __x64_sys_clone+0x289/0x310 [ 2586.967835][T13388] ? __do_sys_vfork+0x130/0x130 [ 2586.972618][T13388] ? debug_smp_processor_id+0x17/0x20 [ 2586.977812][T13388] do_syscall_64+0x44/0xd0 [ 2586.982057][T13388] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2586.987785][T13388] RIP: 0033:0x7fd2e6d030d9 [ 2586.992148][T13388] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2587.011587][T13388] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 04:07:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c00, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2587.019833][T13388] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2587.027644][T13388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2587.035601][T13388] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2587.043351][T13388] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2587.051171][T13388] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2587.058985][T13388] 04:07:07 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x203000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:07 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x500}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x5000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="9500000000000000d1e1e008a849b1aa903d873533a3b7bef6cbfb00b4a173b12d921d25724e0f7bae95f04b443482f7169eecdc05b9000010df70b4b1c2a5569dbab3d4884f80d8d8"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:07 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) 04:07:07 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1f, 0x81, 0x7, 0x69, 0x0, 0xa1ce, 0x30000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xf255, 0x0, @perf_config_ext={0xff, 0x3}, 0x80008, 0x6, 0x5, 0x2, 0x0, 0xfffffffd, 0x2, 0x0, 0x1, 0x0, 0x427b}, r0, 0x3, r1, 0x1) (rerun: 64) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x204000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x205000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="9500000000000000d1e1e008a849b1aa903d873533a3b7bef6cbfb00b4a173b12d921d25724e0f7bae95f04b443482f7169eecdc05b9000010df70b4b1c2a5569dbab3d4884f80d8d8"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="9500000000000000d1e1e008a849b1aa903d873533a3b7bef6cbfb00b4a173b12d921d25724e0f7bae95f04b443482f7169eecdc05b9000010df70b4b1c2a5569dbab3d4884f80d8d8"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) 04:07:07 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1f, 0x81, 0x7, 0x69, 0x0, 0xa1ce, 0x30000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xf255, 0x0, @perf_config_ext={0xff, 0x3}, 0x80008, 0x6, 0x5, 0x2, 0x0, 0xfffffffd, 0x2, 0x0, 0x1, 0x0, 0x427b}, r0, 0x3, r1, 0x1) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1f, 0x81, 0x7, 0x69, 0x0, 0xa1ce, 0x30000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xf255, 0x0, @perf_config_ext={0xff, 0x3}, 0x80008, 0x6, 0x5, 0x2, 0x0, 0xfffffffd, 0x2, 0x0, 0x1, 0x0, 0x427b}, r0, 0x3, r1, 0x1) (async) 04:07:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="9500000000000000d1e1e008a849b1aa903d873533a3b7bef6cbfb00b4a173b12d921d25724e0f7bae95f04b443482f7169eecdc05b9000010df70b4b1c2a5569dbab3d4884f80d8d8"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x300000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2587.124659][T13421] FAULT_INJECTION: forcing a failure. [ 2587.124659][T13421] name failslab, interval 1, probability 0, space 0, times 0 [ 2587.187856][T13421] CPU: 1 PID: 13421 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2587.198040][T13421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2587.207945][T13421] Call Trace: [ 2587.211064][T13421] [ 2587.213836][T13421] dump_stack_lvl+0x151/0x1b7 [ 2587.218356][T13421] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2587.223647][T13421] dump_stack+0x15/0x17 [ 2587.227832][T13421] should_fail+0x3c0/0x510 [ 2587.232078][T13421] __should_failslab+0x9f/0xe0 04:07:07 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@typedef={0xd, 0x0, 0x0, 0x8, 0x3}, @func={0x9, 0x0, 0x0, 0xc, 0x4}, @fwd={0xc}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xd, 0x2}, {0x5}]}]}, {0x0, [0x10]}}, &(0x7f0000000240)=""/140, 0x5b, 0x8c, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000bc0), 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r2]}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='rdma.current\x00', 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x3, 0x8001, 0x76e1, 0x228, r5, 0xffff, '\x00', r0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xf}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r7]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r3, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x10, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r9, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r11]}, 0x80) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r12]}, 0x80) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x100010, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xa, 0xa}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r13]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b80)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1f, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xae}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xf, 0x1, 0x0, r2}, @map_val={0x18, 0x8, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x200}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xd}]}, &(0x7f00000006c0)='GPL\x00', 0x6, 0x2a, &(0x7f0000000700)=""/42, 0x40f00, 0x8, '\x00', r8, 0xb, r1, 0x8, &(0x7f0000000a40)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x4, 0x4, 0x7ff}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000000ac0)=[r2, r11, r4, r5, r12, r13, r2]}, 0x80) r14 = openat$cgroup_ro(r5, &(0x7f00000005c0)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[r4, r5, r6, r14]}, 0x80) r15 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, &(0x7f0000000000), &(0x7f0000000080)='GPL\x00', 0x8001, 0x3c, &(0x7f00000000c0)=""/60, 0x41100, 0x2, '\x00', r0, 0x25, r1, 0x8, &(0x7f0000000340)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x3, 0x1000, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x1, r2, r4, 0xffffffffffffffff, r15]}, 0x80) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2587.236677][T13421] should_failslab+0x9/0x20 [ 2587.241017][T13421] kmem_cache_alloc+0x4f/0x2f0 [ 2587.245618][T13421] ? anon_vma_fork+0x1b9/0x4f0 [ 2587.250219][T13421] anon_vma_fork+0x1b9/0x4f0 [ 2587.254652][T13421] dup_mmap+0x750/0xea0 [ 2587.258638][T13421] ? __delayed_free_task+0x20/0x20 [ 2587.263592][T13421] ? mm_init+0x807/0x960 [ 2587.267663][T13421] dup_mm+0x91/0x330 [ 2587.271402][T13421] copy_mm+0x108/0x1b0 [ 2587.275310][T13421] copy_process+0x1295/0x3250 [ 2587.279901][T13421] ? proc_fail_nth_write+0x213/0x290 [ 2587.285027][T13421] ? proc_fail_nth_read+0x220/0x220 [ 2587.290141][T13421] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2587.295091][T13421] ? vfs_write+0x9af/0x1050 [ 2587.299427][T13421] ? vmacache_update+0xb7/0x120 [ 2587.304127][T13421] kernel_clone+0x22d/0x990 [ 2587.308459][T13421] ? file_end_write+0x1b0/0x1b0 [ 2587.313143][T13421] ? __kasan_check_write+0x14/0x20 [ 2587.318090][T13421] ? create_io_thread+0x1e0/0x1e0 [ 2587.322947][T13421] ? __mutex_lock_slowpath+0x10/0x10 [ 2587.328061][T13421] __x64_sys_clone+0x289/0x310 [ 2587.332662][T13421] ? __do_sys_vfork+0x130/0x130 [ 2587.337349][T13421] ? debug_smp_processor_id+0x17/0x20 [ 2587.342569][T13421] do_syscall_64+0x44/0xd0 [ 2587.346813][T13421] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2587.352534][T13421] RIP: 0033:0x7fd2e6d030d9 [ 2587.356916][T13421] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2587.376351][T13421] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2587.384761][T13421] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2587.392576][T13421] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2587.400389][T13421] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2587.408198][T13421] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2587.416011][T13421] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2587.423910][T13421] 04:07:07 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x700}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:07 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) 04:07:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x5902, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x301000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:07 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@typedef={0xd, 0x0, 0x0, 0x8, 0x3}, @func={0x9, 0x0, 0x0, 0xc, 0x4}, @fwd={0xc}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xd, 0x2}, {0x5}]}]}, {0x0, [0x10]}}, &(0x7f0000000240)=""/140, 0x5b, 0x8c, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000bc0), 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r2]}, 0x80) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) (async) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='rdma.current\x00', 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x3, 0x8001, 0x76e1, 0x228, r5, 0xffff, '\x00', r0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xf}, 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r7]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r3, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x10, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r9, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r11]}, 0x80) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r12]}, 0x80) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x100010, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xa, 0xa}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r13]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b80)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1f, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xae}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xf, 0x1, 0x0, r2}, @map_val={0x18, 0x8, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x200}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xd}]}, &(0x7f00000006c0)='GPL\x00', 0x6, 0x2a, &(0x7f0000000700)=""/42, 0x40f00, 0x8, '\x00', r8, 0xb, r1, 0x8, &(0x7f0000000a40)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x4, 0x4, 0x7ff}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000000ac0)=[r2, r11, r4, r5, r12, r13, r2]}, 0x80) r14 = openat$cgroup_ro(r5, &(0x7f00000005c0)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[r4, r5, r6, r14]}, 0x80) (async) r15 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, &(0x7f0000000000), &(0x7f0000000080)='GPL\x00', 0x8001, 0x3c, &(0x7f00000000c0)=""/60, 0x41100, 0x2, '\x00', r0, 0x25, r1, 0x8, &(0x7f0000000340)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x3, 0x1000, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x1, r2, r4, 0xffffffffffffffff, r15]}, 0x80) (async) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:07 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x302000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:07 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@typedef={0xd, 0x0, 0x0, 0x8, 0x3}, @func={0x9, 0x0, 0x0, 0xc, 0x4}, @fwd={0xc}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xd, 0x2}, {0x5}]}]}, {0x0, [0x10]}}, &(0x7f0000000240)=""/140, 0x5b, 0x8c, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000bc0), 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r2]}, 0x80) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) (async) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='rdma.current\x00', 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x3, 0x8001, 0x76e1, 0x228, r5, 0xffff, '\x00', r0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xf}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r7]}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r3, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x10, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) (async) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r9, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r11]}, 0x80) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r12]}, 0x80) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x100010, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xa, 0xa}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r13]}, 0x80) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b80)=r10, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1f, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xae}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xf, 0x1, 0x0, r2}, @map_val={0x18, 0x8, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x200}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xd}]}, &(0x7f00000006c0)='GPL\x00', 0x6, 0x2a, &(0x7f0000000700)=""/42, 0x40f00, 0x8, '\x00', r8, 0xb, r1, 0x8, &(0x7f0000000a40)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x4, 0x4, 0x7ff}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000000ac0)=[r2, r11, r4, r5, r12, r13, r2]}, 0x80) (async) r14 = openat$cgroup_ro(r5, &(0x7f00000005c0)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[r4, r5, r6, r14]}, 0x80) r15 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, &(0x7f0000000000), &(0x7f0000000080)='GPL\x00', 0x8001, 0x3c, &(0x7f00000000c0)=""/60, 0x41100, 0x2, '\x00', r0, 0x25, r1, 0x8, &(0x7f0000000340)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x3, 0x1000, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x1, r2, r4, 0xffffffffffffffff, r15]}, 0x80) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:07 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) (async) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x303000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x304000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x305000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2587.508605][T13463] FAULT_INJECTION: forcing a failure. [ 2587.508605][T13463] name failslab, interval 1, probability 0, space 0, times 0 [ 2587.528512][T13463] CPU: 1 PID: 13463 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2587.538590][T13463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2587.548482][T13463] Call Trace: [ 2587.551616][T13463] [ 2587.554385][T13463] dump_stack_lvl+0x151/0x1b7 [ 2587.559006][T13463] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2587.564282][T13463] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2587.570529][T13463] dump_stack+0x15/0x17 [ 2587.574523][T13463] should_fail+0x3c0/0x510 [ 2587.578772][T13463] __should_failslab+0x9f/0xe0 [ 2587.583376][T13463] should_failslab+0x9/0x20 [ 2587.587717][T13463] kmem_cache_alloc+0x4f/0x2f0 [ 2587.592314][T13463] ? anon_vma_fork+0xf7/0x4f0 [ 2587.596831][T13463] anon_vma_fork+0xf7/0x4f0 [ 2587.601167][T13463] ? anon_vma_name+0x43/0x70 [ 2587.605607][T13463] dup_mmap+0x750/0xea0 [ 2587.609585][T13463] ? __delayed_free_task+0x20/0x20 [ 2587.614620][T13463] ? mm_init+0x807/0x960 [ 2587.618700][T13463] dup_mm+0x91/0x330 [ 2587.622443][T13463] copy_mm+0x108/0x1b0 [ 2587.626361][T13463] copy_process+0x1295/0x3250 [ 2587.630852][T13463] ? proc_fail_nth_write+0x213/0x290 [ 2587.635981][T13463] ? proc_fail_nth_read+0x220/0x220 [ 2587.641012][T13463] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2587.645955][T13463] ? vfs_write+0x9af/0x1050 [ 2587.650378][T13463] ? vmacache_update+0xb7/0x120 [ 2587.655095][T13463] kernel_clone+0x22d/0x990 [ 2587.659397][T13463] ? file_end_write+0x1b0/0x1b0 [ 2587.664084][T13463] ? __kasan_check_write+0x14/0x20 [ 2587.669055][T13463] ? create_io_thread+0x1e0/0x1e0 [ 2587.674071][T13463] ? __mutex_lock_slowpath+0x10/0x10 [ 2587.679193][T13463] __x64_sys_clone+0x289/0x310 [ 2587.683793][T13463] ? __do_sys_vfork+0x130/0x130 [ 2587.688489][T13463] ? debug_smp_processor_id+0x17/0x20 [ 2587.693687][T13463] do_syscall_64+0x44/0xd0 [ 2587.697947][T13463] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2587.703674][T13463] RIP: 0033:0x7fd2e6d030d9 [ 2587.707922][T13463] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2587.727457][T13463] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2587.735695][T13463] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2587.743504][T13463] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2587.751314][T13463] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2587.759133][T13463] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2587.767198][T13463] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2587.775017][T13463] 04:07:08 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x7a2}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:08 executing program 1: syz_clone(0x36000480, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x7100, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x400000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:08 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) (async) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) 04:07:08 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) 04:07:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="8ea2c5c0e83469e2911f66e9fa622912145e0bdb5c8ba363a82d7fd6a47c1a47ef49f1613d544bfbd598adc320f7b19a9b48dcdff77ec93bbf8ed14797315f71ccaa70014253fc68b8f6550a1600667a62d74305b34d331ed0ca617c819754ccc5b1aae6b03e7a623608470ff8fd716081e255a93e1b4479e338a96afcb78b2970c45769b1c3ad2e05e13d4efb037a4b1a3b1ef55c0d7bf64260c35f5990a05b4c95fe0238c26a9b9ba35ad14c8fb1cbb788bc33c69b8478b563b5d64b4c4e59cdef8445e01d309328c6"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) socketpair(0x1e, 0x800, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f00000000c0)=0x7ff) mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff) 04:07:08 executing program 1: syz_clone(0x36000480, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x401000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="8ea2c5c0e83469e2911f66e9fa622912145e0bdb5c8ba363a82d7fd6a47c1a47ef49f1613d544bfbd598adc320f7b19a9b48dcdff77ec93bbf8ed14797315f71ccaa70014253fc68b8f6550a1600667a62d74305b34d331ed0ca617c819754ccc5b1aae6b03e7a623608470ff8fd716081e255a93e1b4479e338a96afcb78b2970c45769b1c3ad2e05e13d4efb037a4b1a3b1ef55c0d7bf64260c35f5990a05b4c95fe0238c26a9b9ba35ad14c8fb1cbb788bc33c69b8478b563b5d64b4c4e59cdef8445e01d309328c6"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) socketpair(0x1e, 0x800, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f00000000c0)=0x7ff) mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="8ea2c5c0e83469e2911f66e9fa622912145e0bdb5c8ba363a82d7fd6a47c1a47ef49f1613d544bfbd598adc320f7b19a9b48dcdff77ec93bbf8ed14797315f71ccaa70014253fc68b8f6550a1600667a62d74305b34d331ed0ca617c819754ccc5b1aae6b03e7a623608470ff8fd716081e255a93e1b4479e338a96afcb78b2970c45769b1c3ad2e05e13d4efb037a4b1a3b1ef55c0d7bf64260c35f5990a05b4c95fe0238c26a9b9ba35ad14c8fb1cbb788bc33c69b8478b563b5d64b4c4e59cdef8445e01d309328c6"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) socketpair(0x1e, 0x800, 0x0, &(0x7f0000000080)) (async) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f00000000c0)=0x7ff) (async) mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff) (async) 04:07:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x402000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x7d02, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2587.869769][T13498] FAULT_INJECTION: forcing a failure. [ 2587.869769][T13498] name failslab, interval 1, probability 0, space 0, times 0 [ 2587.914635][T13498] CPU: 1 PID: 13498 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2587.924801][T13498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2587.934699][T13498] Call Trace: [ 2587.937820][T13498] [ 2587.940768][T13498] dump_stack_lvl+0x151/0x1b7 [ 2587.945291][T13498] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2587.950581][T13498] dump_stack+0x15/0x17 [ 2587.954571][T13498] should_fail+0x3c0/0x510 [ 2587.959028][T13498] __should_failslab+0x9f/0xe0 [ 2587.963743][T13498] should_failslab+0x9/0x20 [ 2587.968049][T13498] kmem_cache_alloc+0x4f/0x2f0 [ 2587.972751][T13498] ? anon_vma_fork+0x1b9/0x4f0 [ 2587.977551][T13498] anon_vma_fork+0x1b9/0x4f0 [ 2587.981949][T13498] dup_mmap+0x750/0xea0 [ 2587.985952][T13498] ? __delayed_free_task+0x20/0x20 [ 2587.990990][T13498] ? mm_init+0x807/0x960 [ 2587.995227][T13498] dup_mm+0x91/0x330 [ 2587.999022][T13498] copy_mm+0x108/0x1b0 [ 2588.003012][T13498] copy_process+0x1295/0x3250 [ 2588.007527][T13498] ? proc_fail_nth_write+0x213/0x290 [ 2588.012642][T13498] ? proc_fail_nth_read+0x220/0x220 [ 2588.017707][T13498] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2588.022636][T13498] ? vfs_write+0x9af/0x1050 [ 2588.026962][T13498] ? vmacache_update+0xb7/0x120 [ 2588.031651][T13498] kernel_clone+0x22d/0x990 [ 2588.035999][T13498] ? file_end_write+0x1b0/0x1b0 [ 2588.040694][T13498] ? __kasan_check_write+0x14/0x20 [ 2588.045659][T13498] ? create_io_thread+0x1e0/0x1e0 [ 2588.050484][T13498] ? __mutex_lock_slowpath+0x10/0x10 [ 2588.055606][T13498] __x64_sys_clone+0x289/0x310 [ 2588.060223][T13498] ? __do_sys_vfork+0x130/0x130 [ 2588.064903][T13498] ? debug_smp_processor_id+0x17/0x20 [ 2588.070276][T13498] do_syscall_64+0x44/0xd0 [ 2588.074612][T13498] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2588.080439][T13498] RIP: 0033:0x7fd2e6d030d9 [ 2588.084769][T13498] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2588.104913][T13498] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2588.113254][T13498] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2588.121332][T13498] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2588.129227][T13498] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2588.137052][T13498] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2588.144863][T13498] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2588.153101][T13498] 04:07:08 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x2000}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:08 executing program 1: syz_clone(0x36000480, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x36000480, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 04:07:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x403000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xc503, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="8ea2c5c0e83469e2911f66e9fa622912145e0bdb5c8ba363a82d7fd6a47c1a47ef49f1613d544bfbd598adc320f7b19a9b48dcdff77ec93bbf8ed14797315f71ccaa70014253fc68b8f6550a1600667a62d74305b34d331ed0ca617c819754ccc5b1aae6b03e7a623608470ff8fd716081e255a93e1b4479e338a96afcb78b2970c45769b1c3ad2e05e13d4efb037a4b1a3b1ef55c0d7bf64260c35f5990a05b4c95fe0238c26a9b9ba35ad14c8fb1cbb788bc33c69b8478b563b5d64b4c4e59cdef8445e01d309328c6"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) socketpair(0x1e, 0x800, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f00000000c0)=0x7ff) mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="8ea2c5c0e83469e2911f66e9fa622912145e0bdb5c8ba363a82d7fd6a47c1a47ef49f1613d544bfbd598adc320f7b19a9b48dcdff77ec93bbf8ed14797315f71ccaa70014253fc68b8f6550a1600667a62d74305b34d331ed0ca617c819754ccc5b1aae6b03e7a623608470ff8fd716081e255a93e1b4479e338a96afcb78b2970c45769b1c3ad2e05e13d4efb037a4b1a3b1ef55c0d7bf64260c35f5990a05b4c95fe0238c26a9b9ba35ad14c8fb1cbb788bc33c69b8478b563b5d64b4c4e59cdef8445e01d309328c6"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) socketpair(0x1e, 0x800, 0x0, &(0x7f0000000080)) (async) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f00000000c0)=0x7ff) (async) mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff) (async) 04:07:08 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) 04:07:08 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)=']^\\.\xb9\xf6,\x00'}, 0x30) gettid() 04:07:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x404000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:08 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)=']^\\.\xb9\xf6,\x00'}, 0x30) (async) gettid() [ 2588.208566][T13533] FAULT_INJECTION: forcing a failure. [ 2588.208566][T13533] name failslab, interval 1, probability 0, space 0, times 0 [ 2588.224811][T13533] CPU: 1 PID: 13533 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2588.235062][T13533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2588.244954][T13533] Call Trace: [ 2588.248082][T13533] [ 2588.250878][T13533] dump_stack_lvl+0x151/0x1b7 04:07:08 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async, rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)=']^\\.\xb9\xf6,\x00'}, 0x30) (async, rerun: 64) gettid() [ 2588.255371][T13533] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2588.260757][T13533] dump_stack+0x15/0x17 [ 2588.264754][T13533] should_fail+0x3c0/0x510 [ 2588.269000][T13533] __should_failslab+0x9f/0xe0 [ 2588.273652][T13533] should_failslab+0x9/0x20 [ 2588.278129][T13533] kmem_cache_alloc+0x4f/0x2f0 [ 2588.282712][T13533] ? anon_vma_clone+0xa1/0x4f0 [ 2588.287484][T13533] anon_vma_clone+0xa1/0x4f0 [ 2588.292346][T13533] anon_vma_fork+0x91/0x4f0 [ 2588.296684][T13533] ? anon_vma_name+0x43/0x70 [ 2588.301297][T13533] dup_mmap+0x750/0xea0 [ 2588.305326][T13533] ? __delayed_free_task+0x20/0x20 [ 2588.310225][T13533] ? mm_init+0x807/0x960 [ 2588.314305][T13533] dup_mm+0x91/0x330 [ 2588.318048][T13533] copy_mm+0x108/0x1b0 [ 2588.321941][T13533] copy_process+0x1295/0x3250 [ 2588.326451][T13533] ? proc_fail_nth_write+0x213/0x290 [ 2588.331571][T13533] ? proc_fail_nth_read+0x220/0x220 [ 2588.336605][T13533] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2588.341557][T13533] ? vfs_write+0x9af/0x1050 [ 2588.345917][T13533] ? vmacache_update+0xb7/0x120 [ 2588.350609][T13533] kernel_clone+0x22d/0x990 [ 2588.355023][T13533] ? file_end_write+0x1b0/0x1b0 [ 2588.359703][T13533] ? __kasan_check_write+0x14/0x20 [ 2588.364734][T13533] ? create_io_thread+0x1e0/0x1e0 [ 2588.369592][T13533] ? __mutex_lock_slowpath+0x10/0x10 [ 2588.374724][T13533] __x64_sys_clone+0x289/0x310 [ 2588.379301][T13533] ? __do_sys_vfork+0x130/0x130 [ 2588.384091][T13533] ? debug_smp_processor_id+0x17/0x20 [ 2588.389892][T13533] do_syscall_64+0x44/0xd0 [ 2588.394144][T13533] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2588.399956][T13533] RIP: 0033:0x7fd2e6d030d9 [ 2588.404213][T13533] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2588.423743][T13533] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2588.432096][T13533] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2588.440026][T13533] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2588.447922][T13533] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 04:07:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xcc03, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x405000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2588.455826][T13533] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2588.463632][T13533] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2588.471617][T13533] 04:07:08 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x4000}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1867000010000004000000003d3ceedf4000000085200000accf010261eb2a0a5e07dc81a6c4576795024150b8a01caf26727d9be355ee17b7c2bbb9e00fd11508d843fc1986d2bc8855ba8e36ddc34d9989a8f9f2a568837028eff1dd8ffbcd2fb6a8"], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x41100, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x2, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0xa, 0x1, 0x0, r1}], &(0x7f0000000100)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x8, 0x0, 0x0, 0xec2}, 0x10}, 0x80) 04:07:08 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) 04:07:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x500000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:08 executing program 1: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000), 0x4) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x30000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x501000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1867000010000004000000003d3ceedf4000000085200000accf010261eb2a0a5e07dc81a6c4576795024150b8a01caf26727d9be355ee17b7c2bbb9e00fd11508d843fc1986d2bc8855ba8e36ddc34d9989a8f9f2a568837028eff1dd8ffbcd2fb6a8"], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x41100, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x2, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0xa, 0x1, 0x0, r1}], &(0x7f0000000100)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x8, 0x0, 0x0, 0xec2}, 0x10}, 0x80) 04:07:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x502000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:08 executing program 1: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000), 0x4) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000), 0x4) (async) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 04:07:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1867000010000004000000003d3ceedf4000000085200000accf010261eb2a0a5e07dc81a6c4576795024150b8a01caf26727d9be355ee17b7c2bbb9e00fd11508d843fc1986d2bc8855ba8e36ddc34d9989a8f9f2a568837028eff1dd8ffbcd2fb6a8"], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x41100, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r1]}, 0x80) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x2, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0xa, 0x1, 0x0, r1}], &(0x7f0000000100)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x8, 0x0, 0x0, 0xec2}, 0x10}, 0x80) 04:07:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x503000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2588.639134][T13562] FAULT_INJECTION: forcing a failure. [ 2588.639134][T13562] name failslab, interval 1, probability 0, space 0, times 0 [ 2588.654914][T13562] CPU: 0 PID: 13562 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2588.665513][T13562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2588.675441][T13562] Call Trace: [ 2588.678539][T13562] [ 2588.681401][T13562] dump_stack_lvl+0x151/0x1b7 [ 2588.685907][T13562] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2588.691207][T13562] dump_stack+0x15/0x17 [ 2588.695213][T13562] should_fail+0x3c0/0x510 [ 2588.699481][T13562] __should_failslab+0x9f/0xe0 [ 2588.704041][T13562] should_failslab+0x9/0x20 [ 2588.708478][T13562] kmem_cache_alloc+0x4f/0x2f0 [ 2588.712986][T13562] ? anon_vma_clone+0xa1/0x4f0 [ 2588.717712][T13562] anon_vma_clone+0xa1/0x4f0 [ 2588.722118][T13562] anon_vma_fork+0x91/0x4f0 [ 2588.726442][T13562] ? anon_vma_name+0x4c/0x70 [ 2588.731303][T13562] dup_mmap+0x750/0xea0 [ 2588.735308][T13562] ? __delayed_free_task+0x20/0x20 [ 2588.740433][T13562] ? mm_init+0x807/0x960 [ 2588.744581][T13562] dup_mm+0x91/0x330 [ 2588.748315][T13562] copy_mm+0x108/0x1b0 [ 2588.752218][T13562] copy_process+0x1295/0x3250 [ 2588.756732][T13562] ? proc_fail_nth_write+0x213/0x290 [ 2588.761871][T13562] ? proc_fail_nth_read+0x220/0x220 [ 2588.766888][T13562] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2588.771834][T13562] ? vfs_write+0x9af/0x1050 [ 2588.776173][T13562] ? vmacache_update+0xb7/0x120 [ 2588.780868][T13562] kernel_clone+0x22d/0x990 [ 2588.785324][T13562] ? file_end_write+0x1b0/0x1b0 [ 2588.790004][T13562] ? __kasan_check_write+0x14/0x20 [ 2588.794947][T13562] ? create_io_thread+0x1e0/0x1e0 [ 2588.799805][T13562] ? __mutex_lock_slowpath+0x10/0x10 [ 2588.804942][T13562] __x64_sys_clone+0x289/0x310 [ 2588.809529][T13562] ? __do_sys_vfork+0x130/0x130 [ 2588.814301][T13562] ? debug_smp_processor_id+0x17/0x20 [ 2588.819509][T13562] do_syscall_64+0x44/0xd0 [ 2588.823776][T13562] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2588.829646][T13562] RIP: 0033:0x7fd2e6d030d9 [ 2588.833873][T13562] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2588.853377][T13562] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2588.862315][T13562] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2588.870215][T13562] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2588.878051][T13562] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2588.886106][T13562] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2588.893912][T13562] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2588.901822][T13562] 04:07:09 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x5000}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x14, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x2}, 0x10}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r2, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000002940)={&(0x7f0000002680)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000002840)=[{&(0x7f00000026c0)="63ccbd3c063f7152da0da7936cc73d185e400c71dd56f89300c9a81d9fcc8ed53beabe524f1f0331494e878b840b11b8b82928e1ce77c7a49d318cd1f037053d0b6100360c54be2d0b", 0x49}, {&(0x7f0000002740)="9cfb1ba38b3b2e220a46e1f375233e358562049b48c9b00b536d", 0x1a}, {&(0x7f0000002780)="da55ba424d00577cd24944ed246ad21606e7197ce8c021fa2114c2b7ec92e5480c9168498637aedbf4773a9fdb7b67747ddb989ae084517400cd6181c89c8a2486c6175c42a63e30c0a2c5759a2a015772621fe542902d3961a65a5a972ee3e99955334088d92beec301b7ec43fba74fc9ca65174869299abd092f17357d83e6f93df388837359033d33150aee59d7fb663f51f2753e2ed22b7b7ec05750f69d705866274cc55e539f726e1a5bfe0cb27835a92e29007ddb78b424c6e4", 0xbd}], 0x3, &(0x7f0000002880)=[@ip_retopts={{0x9c, 0x0, 0x7, {[@lsrr={0x83, 0x27, 0xd5, [@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @rand_addr=0x64010101, @empty, @broadcast, @rand_addr=0x64010101, @empty, @multicast1, @multicast2]}, @generic={0x83, 0xf, "94c71372c0ed3ff16ea719c48d"}, @rr={0x7, 0x7, 0x15, [@rand_addr=0x64010101]}, @end, @timestamp_prespec={0x44, 0x24, 0xbe, 0x3, 0xb, [{@broadcast, 0x2}, {@rand_addr=0x64010100, 0x3}, {@loopback}, {@loopback, 0x80}]}, @lsrr={0x83, 0x7, 0x93, [@dev={0xac, 0x14, 0x14, 0xb}]}, @timestamp={0x44, 0x1c, 0xc0, 0x0, 0x7, [0x3, 0x8, 0x3, 0x2, 0x3, 0xf8fa]}, @generic={0x82, 0x4, "61f5"}]}}}], 0xa0}, 0x20004080) sendmsg$inet(r2, &(0x7f0000002640)={&(0x7f0000000140)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000002580)=[{&(0x7f0000000180)="122d3adb00debc966ee52728410924e9dbad722bd9b6577d68ac3b54da", 0x1d}, {&(0x7f00000001c0)="cf3d6347e137628207bc99a1877806d24eadb53226719401f81c6f3732d64910a1f619e0cb", 0x25}, {&(0x7f0000000200)="d0d73d0dac1fd4ffe9bcefc160973ae5528a8de89ef0ef737df91becbc457efd43d5c09d7bfbf95329266398344e7e1d3cf59dbf749db91f2b120b465409fc890a5a7a43862b3b00dc404394", 0x4c}, {&(0x7f0000000280)="281a5633d991cd9ece465a8f01362516013ec38f718dbbccdd8da92dbd30177a791f14444347e5e1171287cab3b425038ff9c8387c6b6b594075855eae5bc2f766638f12e11ba0ef66a3d98b22b2ae4f7b9ab66334dc916a4493a2bf1bf6c795f453240fc9b3088b8cd55393d6f8b120ecae03590b4e39acecf9405a5c09e82d07e16d9e6d8fe36a1556", 0x8a}, {&(0x7f0000000340)="575291c9865fe58c713e52ff079ae8587549a4c40342fe5376907677f7495111d0f1076e0a9acaa6b7fd0887a1ee934a8ffcf07e64818fc82aded80d7c6143dc", 0x40}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="990427508c62018e51614f71675d04e645f8f3d30ebbbe08ca650dfb81397f024b0a8b2cc31287543d2935ec556e304808dafe1c9900b8b090837fced281e401ea9d025fb57bf7b725808510f7bb2791bfdf1360ce48333ff1d3242775bbd41b5d3bf8f6a956c28066a3a865d44023572aa4596898e163c6aea41e032cfd2d6f581bbb8a973e8bbee607cf188dc8843aeadec4b074056fed8d7816d20f3c6396b40ca4d9319efdc9b7d71045ba8a09ea742bc7409783c2531cc57d3a758a78895317f9797eb4f18e76b55c23ecf4ff4031b2a0c5de2bcff73a3d946a77ddfd31e9debf02d1e203affdfc0c6ef92df764398fa8d3968251ce5083e2d2cfcf0d3cef9c5ae71c5b04f2d9401135ea40b4661c1a7c9eb2ac5f2a84a29d08d8f53409474e523fa7ad36c1aad6cb8486bafb3ae258452877190a1ba4c36a943b10bc2eca5f5636ab9ced3b65fd3b26afe40f722b5096f7b24ce116b6dacf5a61b00e68ceb0cb3492df132cf94b05825997a72ec35aa39f43b13447ce6975eea7c2ed53fbf8d2e97a797f71fcacae1cd27a76647ab4064b6b7de7dd0b388be86317d89517d11efcf8e81b3796d6b94d01da092eb07b637d2b89c05380cd42bff3987483b26490f4a6a1752a89ce93501bfe788303a76534868b4b2a32bd9b99fe5a38955b53dea39ee88e258fec98dd5930b3f6400fa6048fc5d863fe5bff5cb1b840c97b83ef9a5c11f6710610838360eaa3f4c104d4e3605cbbb5c4ad99dcdb9682432d3a46e6cc2051045f3878f717214f2b04e3ed6b0012d2a892028bbc6fa2183cda14fec0b5bcf16f7437fc88d2fdfd3b6fb62d78dbfb595d764c2931a8de48a87652a1225ab4db3278064c36b765965460c183daef51e7dd91074686bbd89af3384f8767b1ca0672710356ca5dd80bf62ef9156cea32290ff47c7b819eb77b61017c14bcc662340c5e914982a38ba898742b31ec442c270c0abafe2f09d5f66669a9720cd3ee0a27f6293217ff16f09e280ccc29d5096724cfa7d1bf4d496ed09fbf32fd731149313101d62861839422731f0453a90ed51c9da5bfa71abcc66702e5e8d7a28c8f903b0fa1bae6bba3b5f543c4871e1e641236844af80dd873f70bba7e529752eb316a20d185d0dad7b3f6cdff25129b178b42f3a3f0d514523809c4e6be4d03c2d0a59f7184e9670752cb83e79442068a41f35709cc57df3aedd8c99e49d4e0ed329d888213715c4565c2f3f053ceb9de5fd4150e242beb6fdda3b3012a87261391b35c8ccd41b6137c4c7d78ff81bce6ab36dc9891da1a07d5558430c108d76d8e0d2fa22a65ad29a7b19874c708a778ebe72decaa32b1f37748405fc4cc58582157103d57c6b003b9c10d48b5be0835d8906c17dad9ed6aeb97fbf546a2557a64d07ec4a43ac4ade885a50a9e7b5aef5569bce9393f3919acf3911cfc3cc4456cf256f2c08223eb77e36662136063df0f5d7dce94535b3f551985376a289449eee0cad466f6865c779f71ef04dde37d1dee06bacfdf09703207d5709e0da0c0a678dad1fc20880a9348afc875842666c02ba5fb233c293082d5ba1e43a63878915277da6ab6fbd3fcf1acadffa69095b2df36655daaf4a0729f09dabd7320be3d984d0d26467b1774c1901e013d5acfa5943f19fb705af3ed904b3d2dbc722c5ae333646a8ed755778b82fd0cbd6134e4db37614a09ae56a0fa53bacf7be4daf0f13363a310c9055438cc1a4f16b335e9299e97f93060a43b084875fa80c57aa7dbe63674b3e4e398e5ad67e079cc656fe04bff625bb525af659962d000b0674de7b23f8cc5e8d28dd7257e612963d15027f085fb9678895520557236016a8ad6389094ceab43f96762e6af0d7490b81895b28a22af6556fb36d16e63162714ae1ec52f1b53742ce4520b2819ace3bc5e4c3882ebb9e7f00d7831876b0113b6a2cfcc5fe1dee0de25c699423c620b4baf169d6fe8422af2dfb770ff455191c100d3b0bb363881a7963f9f2eec598bac00313b3de23a98b42138a74f6c05ff2a744405c3026277acbe7177df803447b320b2edffbb49c8c42d4129ccd2ecab94d26d5d4ad2a74f131994eba689895943af06ff588f8f80a6a8083af7a2752945e946b56cd9af44dcf0b98147f6b76670b0837477118ebaba391d166e6fb7e65b729e8276650f855dd747da606b78799b4e7bd35d723eb95f1ace37e94ab98285286164484cac99314a62690b313f37431b424f6b6ebb152f9162582c5262eff488975956c4e65d4edba04070eabe067c7e6b08ff6f556c211f766f0864ddf24fafb53ef8040ea55ed474db45e8cfe122141f9e61b23c1e36f7abfd046ad0acf92b79eb03666e9ea19250a675dd28ceafb0078e809b3fa8b4af6bb03e3c8d1a3225db02385e6a452bfcd1011cd3926bc055194028002c92fa82798fbb86b9add806978c57b6b71dc5b6daee287262825d7308d2bbf5c647c1b3226ea919aa4797dbfc13269e0ba6f46739263c34fc44cfd9285fb0dc33a3326d3bf7af0368e3c153e4e7de06e8e43146bc1a232cd1eccb36aaffcd80136525572a02a9db4f526a8c82df776e3b440e98e6e986fffeef6caec7f85d79ad50d53a92d7638bf6b9de1f0279c41e539fad153eca38a61ec75ed5d496bcb27a0c0db3750311709a25546330aa94c45827faf945f4d032c8ae4376a03a3a8e7d97fa7e2ae71246535ab85aa5b46c0cf6368598de5b0a78fa88c58fde030db3cbc599d764bf0a8b043d7dce7536a9d3106b8c07ba94caeb1f4a787e5d5dedf2455b53a42e586d1de6490e9022792107e00ab8c01bbbcb1e91045cefa3067599e0aafc7c26d9347a0424823124c408f3766edd0153515b02a55648c8173af56037bfc72d0e8993413427b914dfeb621254df61a3e41b78e34b1c037340e3a328cfad12727088ed0fd765be3894f4d274cf277eba42d18c32359202708cda6e06eee2ed16d3de8bfb2943d8b26333d10dbd8a418fbcdace1af1676a6293798a53d90ed9cb2bad39ef8c793afd584bfbcc37d7e4558ed56e89e93573cf378e1dd37eb842c8302e3f8ab44ed7a4dbe887e628afe25de83518517e9675faaa1023282125c7e8f00bad6d67ef115ce934c8f4111aa03a18d4a9c89280bbe8d674a6ff40328b0276c3f8a7dd6ef92dbd5662fc97a430c88073403cff095e2d2e832b5e25160264be20269cca8b30d6daa76de338813c4d239bb65c49b3d489bfa560489c2b1d49b1918de91cd77c23cb4f9860a662bc982e2b5d25adf47dd25408ec8ea54e61db32a0a2319123229b0097995a459463ec6199fb4f9235d8c60a50ea99bc91daa129ebea367acc6efe84b27979ade349273d0f128840f91d0012140f04b0eff77d866bde36feb3ba4e49717f73380b5495e54ed90bdc58b0e4fc25cb0f315d2e0f5837b1bddc54c2f6aeaefc58178c5129b1b72e3e7920fc9f9d39613537feea75354bc10f0b5db578746f2f76c8cf3a06b328b1cc35c5c4e5f2a5e742001fcd163e294443eee6e4eb936b39fe273a2bd0f747f5c15621e59968f8e5df9491235aaf92ba9397b76303e29b8f2295abaee0bfc9982025901a0edae85b39a8d159a00c2d27ba99c7814ac0697971b32932d8dd7b7cac339556d980b942debcfa07eaf19b49446fbb849f4b760fcc995e0f7d97febf3336ed12c6a175317a0442108ac69514ff731466fd8b134361079a922df384ee908dc29586397913b039751158b0d05046affa0efcec752763e41292dc99fe4f29530126fb32ec994f204a7dc51ed25eb1709a9045d9cf9a9a37b01771e0e46ae750dec44fd11db5eb3a04a324073db2578151d360d36f471ebf798da6500366b37676bf48f1fec20984a19a66b3ed183d456fc21c30ee711e19e5745cecacb22e7862b61b79b03eb7b66a025cff37d2a90f2ec5c182f0df0d8e76ef0b90c8e438290db20e1405c3b1475d949feb6d36001036ec0343a2dc6c53490c7174b5f6b93b54af58bf6669b9a33f2ca99bd6235a1b2dc3142fe2b5d982ecc2875d31d8484dcee8b32277d535e39bc2ce9dbd9b8abe67c3ed6d0f5869fc408f33267df25eb3479e26a2eb5be08c25e344bf806e0b6709e561d6d2daba13f50e3f840ef6fd3a2ccd6204d904cdb245eec57c3b30e04d759c2793cc47dfe38437df5e1922f0e648619b95c369562b1252405ccb1be5b3bfdd49024a9762ce842be1331ac5f3519f52e675e274f80eb6f713112f39646631c409b97172fb14d93680b58df8f495f654bf42fcfea37c47f4cc949d6a8f823b5864ca750956440893b4132d754bca0ccd63fae325160b78ec245651d7ef96df85267d447b8b80826347c89c396cc5d41cdfa92ae4dd8b215f4a9bb9f9e4a0204042c4f86590f3cf1024f191977a7b00c72c0c14c24a6ba547721a17c56fffb1d1cb4eb2996ae1917c829736dec01ad9769dd5c848013b56e09b604d378c2535925f901b5d0f0abffdc0c03b2da1a1bee3661a18b096b41be0ffdbcd5266b8bfcc19d914a69d2bc2c385c33c6f66ce603b3e9cc5464b21f30ffe75731995054d46ecaed92471f0be3f45c54b5ba9a7494516c215fbd0d8e0dddcb1846075ed5f9b3f5b9c46580ba093901261588c668d2cf7f653c09246929e5453143e688e263b2d8fdc96365493b9d4b1fe84ba6d478a29817f61445be72c9bf1c685f79d9d6ca0d24102e490981e3c27bd044d6655277725404d002c1be91734e0da7fdb88f14dce1a49fec2007d4cf74ee77246563cbaf303b01cfaf62b105bc33aa6a840c2491deb2250c05ab0d73afe50ee7db2bfe6d01264e1c8753168efce36eef707dcb940b2359b4a48c85551570773e0d58d51c6f9d5004e36699996e39548cf64d21249d0f1338277a23e31b4169f34a172ef90af498939ee9060435ec62ece924da94df42f438cb026357b67d1ccdda474e9d809b9b196d302ffc63356c2b38daa1ce89dd00fc6e61f61eaa8819ba1bac2a0196069f99ef9650fcc4241a60203b4c0c33d32a3177e71fd6e750525b1f0c1d0f1f833c248a7d4169fcce4387a4a918c7418e22fc886c960b5b7b9d796f084e283463a109b87ac306b61216b7e2b5fe1e8973c61d9639b9fa52dd570752f483449cdbec546b7cc11e961dd6aad9fba0630fc59f4248eaa3e3dd10f05b376a4bc2d42022ec8ad7e072911eee6cd02d83d2a4c9de4642cbdf905283afcc213e686e4258fc1bcaa92630e4a3ba8942118524a2b89c8cf5f5b5a2a2d5e10499691de270b1a5dd8cae9bd56f6241651066cc1a12a1a2a1bb5702896211fe0074430237196f66a996d4b8783b3f3f7026f0304053518c3719494c23af4d5f78196f3c5349833852aa6e6fb2e3c0e3a5b6dd39cb4bffd95bc617f294b3ba910063e4150850a885497267ce671870a0a72f7dc6faa1669248088ec9a61fa758b81c06053a26fe9ba0fa6637ae4162ca7363230e07eca9f45b12e18bf91c4ee87f8ab225535a92a82f378b7eeb3e4956397b15dd710e0031259ff8b7d106e1c4bb237c83c859141b4dc50299c05c3c9ada31f1676fe302792c7e7e9a6c42d5e553cf579fe7e774cca004d44f2d9dfa81685b461b5a02e2352c139f689b1f6bc82fed0db0b55fa4884befb6fb61e65d406510bdfaec94a5bdbb789a123bca6e5a1c810ec3cd3050ce2a04c1e5ff7cd0f16e7e4fe70d5a63140b261c29dde8b27d4cc90c1c9fdda3667fada2e2aa6d03da45c53a93c9526ccb6fccde418af45dc42dcce5c644bfe4836834cc2c2", 0x1000}, {&(0x7f0000000380)="78a254e78f45b44e1404be5cf84e4254e8afe6e0b57963c8fff88387b3ceb8bd28192cdc49f1727fafa12f074d2366b2ce62f8d24940e8c43d3f173ee402d36af08bac6be692674d420065762563b809465358824ed044a24bb92e152b4af4a7969543c43c5568c1093b", 0x6a}, {&(0x7f0000000400)="54bf9a609d27029abd3840c21a74185407e698dc809bd66296bad9262d9bece91fae501e46cde8ab835ff369098e4be0ea8f616921b9d70c08aeef6c126939ad882d6a877cf5c80df1cc7824883691ca35ab8db3a4a14e168971ea700e5d45238832c9d22ace6ae3956568eeea45c5d1e71a33bbf6e4e20bf587a205c65535585804e1873aee31d147b083a480e68a3a0ed45b2d48488ffe8f652963ecf37559e4a6f271bcd27859263b1fe7815045dfab413a5658b2eae6eb922739948c45c1a8a3af3ebf0cf111e224f7a955872b368a31a00d3c369486083d7d809fbe", 0xde}, {&(0x7f0000000500)="ace3712fccfdf1f01bbce4697d4ce7ad6ec37c3e30c82c65396923d3a6c87625", 0x20}], 0xa}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000040)='syz1\x00', 0x1ff) 04:07:09 executing program 1: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000), 0x4) (async) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:09 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x70000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:09 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x504000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:09 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) 04:07:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x14, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x2}, 0x10}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r2, 0x0, 0x0) (async) sendmsg$inet(r2, &(0x7f0000002940)={&(0x7f0000002680)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000002840)=[{&(0x7f00000026c0)="63ccbd3c063f7152da0da7936cc73d185e400c71dd56f89300c9a81d9fcc8ed53beabe524f1f0331494e878b840b11b8b82928e1ce77c7a49d318cd1f037053d0b6100360c54be2d0b", 0x49}, {&(0x7f0000002740)="9cfb1ba38b3b2e220a46e1f375233e358562049b48c9b00b536d", 0x1a}, {&(0x7f0000002780)="da55ba424d00577cd24944ed246ad21606e7197ce8c021fa2114c2b7ec92e5480c9168498637aedbf4773a9fdb7b67747ddb989ae084517400cd6181c89c8a2486c6175c42a63e30c0a2c5759a2a015772621fe542902d3961a65a5a972ee3e99955334088d92beec301b7ec43fba74fc9ca65174869299abd092f17357d83e6f93df388837359033d33150aee59d7fb663f51f2753e2ed22b7b7ec05750f69d705866274cc55e539f726e1a5bfe0cb27835a92e29007ddb78b424c6e4", 0xbd}], 0x3, &(0x7f0000002880)=[@ip_retopts={{0x9c, 0x0, 0x7, {[@lsrr={0x83, 0x27, 0xd5, [@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @rand_addr=0x64010101, @empty, @broadcast, @rand_addr=0x64010101, @empty, @multicast1, @multicast2]}, @generic={0x83, 0xf, "94c71372c0ed3ff16ea719c48d"}, @rr={0x7, 0x7, 0x15, [@rand_addr=0x64010101]}, @end, @timestamp_prespec={0x44, 0x24, 0xbe, 0x3, 0xb, [{@broadcast, 0x2}, {@rand_addr=0x64010100, 0x3}, {@loopback}, {@loopback, 0x80}]}, @lsrr={0x83, 0x7, 0x93, [@dev={0xac, 0x14, 0x14, 0xb}]}, @timestamp={0x44, 0x1c, 0xc0, 0x0, 0x7, [0x3, 0x8, 0x3, 0x2, 0x3, 0xf8fa]}, @generic={0x82, 0x4, "61f5"}]}}}], 0xa0}, 0x20004080) (async) sendmsg$inet(r2, &(0x7f0000002640)={&(0x7f0000000140)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000002580)=[{&(0x7f0000000180)="122d3adb00debc966ee52728410924e9dbad722bd9b6577d68ac3b54da", 0x1d}, {&(0x7f00000001c0)="cf3d6347e137628207bc99a1877806d24eadb53226719401f81c6f3732d64910a1f619e0cb", 0x25}, {&(0x7f0000000200)="d0d73d0dac1fd4ffe9bcefc160973ae5528a8de89ef0ef737df91becbc457efd43d5c09d7bfbf95329266398344e7e1d3cf59dbf749db91f2b120b465409fc890a5a7a43862b3b00dc404394", 0x4c}, {&(0x7f0000000280)="281a5633d991cd9ece465a8f01362516013ec38f718dbbccdd8da92dbd30177a791f14444347e5e1171287cab3b425038ff9c8387c6b6b594075855eae5bc2f766638f12e11ba0ef66a3d98b22b2ae4f7b9ab66334dc916a4493a2bf1bf6c795f453240fc9b3088b8cd55393d6f8b120ecae03590b4e39acecf9405a5c09e82d07e16d9e6d8fe36a1556", 0x8a}, {&(0x7f0000000340)="575291c9865fe58c713e52ff079ae8587549a4c40342fe5376907677f7495111d0f1076e0a9acaa6b7fd0887a1ee934a8ffcf07e64818fc82aded80d7c6143dc", 0x40}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="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", 0x1000}, {&(0x7f0000000380)="78a254e78f45b44e1404be5cf84e4254e8afe6e0b57963c8fff88387b3ceb8bd28192cdc49f1727fafa12f074d2366b2ce62f8d24940e8c43d3f173ee402d36af08bac6be692674d420065762563b809465358824ed044a24bb92e152b4af4a7969543c43c5568c1093b", 0x6a}, {&(0x7f0000000400)="54bf9a609d27029abd3840c21a74185407e698dc809bd66296bad9262d9bece91fae501e46cde8ab835ff369098e4be0ea8f616921b9d70c08aeef6c126939ad882d6a877cf5c80df1cc7824883691ca35ab8db3a4a14e168971ea700e5d45238832c9d22ace6ae3956568eeea45c5d1e71a33bbf6e4e20bf587a205c65535585804e1873aee31d147b083a480e68a3a0ed45b2d48488ffe8f652963ecf37559e4a6f271bcd27859263b1fe7815045dfab413a5658b2eae6eb922739948c45c1a8a3af3ebf0cf111e224f7a955872b368a31a00d3c369486083d7d809fbe", 0xde}, {&(0x7f0000000500)="ace3712fccfdf1f01bbce4697d4ce7ad6ec37c3e30c82c65396923d3a6c87625", 0x20}], 0xa}, 0x0) (async, rerun: 64) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) (rerun: 64) mkdirat$cgroup(r3, &(0x7f0000000040)='syz1\x00', 0x1ff) 04:07:09 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x505000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2588.963385][T13602] FAULT_INJECTION: forcing a failure. [ 2588.963385][T13602] name failslab, interval 1, probability 0, space 0, times 0 [ 2588.980134][T13602] CPU: 1 PID: 13602 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2588.991167][T13602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2589.001230][T13602] Call Trace: [ 2589.004356][T13602] [ 2589.007131][T13602] dump_stack_lvl+0x151/0x1b7 [ 2589.011656][T13602] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2589.016945][T13602] ? do_syscall_64+0x44/0xd0 [ 2589.021369][T13602] dump_stack+0x15/0x17 [ 2589.025356][T13602] should_fail+0x3c0/0x510 [ 2589.029685][T13602] __should_failslab+0x9f/0xe0 [ 2589.034340][T13602] should_failslab+0x9/0x20 [ 2589.038646][T13602] kmem_cache_alloc+0x4f/0x2f0 [ 2589.043236][T13602] ? anon_vma_clone+0xa1/0x4f0 [ 2589.047905][T13602] anon_vma_clone+0xa1/0x4f0 [ 2589.052274][T13602] anon_vma_fork+0x91/0x4f0 [ 2589.056601][T13602] ? anon_vma_name+0x43/0x70 [ 2589.061031][T13602] dup_mmap+0x750/0xea0 [ 2589.065020][T13602] ? __delayed_free_task+0x20/0x20 [ 2589.069971][T13602] ? mm_init+0x807/0x960 [ 2589.074066][T13602] dup_mm+0x91/0x330 [ 2589.077884][T13602] copy_mm+0x108/0x1b0 [ 2589.081827][T13602] copy_process+0x1295/0x3250 [ 2589.086303][T13602] ? proc_fail_nth_write+0x213/0x290 [ 2589.091419][T13602] ? proc_fail_nth_read+0x220/0x220 [ 2589.096493][T13602] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2589.101479][T13602] ? vfs_write+0x9af/0x1050 [ 2589.105818][T13602] ? vmacache_update+0xb7/0x120 [ 2589.110686][T13602] kernel_clone+0x22d/0x990 [ 2589.115020][T13602] ? file_end_write+0x1b0/0x1b0 [ 2589.119714][T13602] ? __kasan_check_write+0x14/0x20 [ 2589.124665][T13602] ? create_io_thread+0x1e0/0x1e0 [ 2589.129520][T13602] ? __mutex_lock_slowpath+0x10/0x10 [ 2589.134734][T13602] __x64_sys_clone+0x289/0x310 [ 2589.139356][T13602] ? __do_sys_vfork+0x130/0x130 [ 2589.144110][T13602] ? debug_smp_processor_id+0x17/0x20 [ 2589.149323][T13602] do_syscall_64+0x44/0xd0 [ 2589.153817][T13602] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2589.159717][T13602] RIP: 0033:0x7fd2e6d030d9 [ 2589.163994][T13602] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2589.183595][T13602] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2589.191837][T13602] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2589.199828][T13602] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 04:07:09 executing program 1: r0 = syz_clone(0x27248180, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/user\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x420500, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000080)) 04:07:09 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) [ 2589.207630][T13602] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2589.215534][T13602] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2589.223338][T13602] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2589.231174][T13602] [ 2589.252907][T13619] FAULT_INJECTION: forcing a failure. 04:07:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x14, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x2}, 0x10}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r2, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000002940)={&(0x7f0000002680)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000002840)=[{&(0x7f00000026c0)="63ccbd3c063f7152da0da7936cc73d185e400c71dd56f89300c9a81d9fcc8ed53beabe524f1f0331494e878b840b11b8b82928e1ce77c7a49d318cd1f037053d0b6100360c54be2d0b", 0x49}, {&(0x7f0000002740)="9cfb1ba38b3b2e220a46e1f375233e358562049b48c9b00b536d", 0x1a}, {&(0x7f0000002780)="da55ba424d00577cd24944ed246ad21606e7197ce8c021fa2114c2b7ec92e5480c9168498637aedbf4773a9fdb7b67747ddb989ae084517400cd6181c89c8a2486c6175c42a63e30c0a2c5759a2a015772621fe542902d3961a65a5a972ee3e99955334088d92beec301b7ec43fba74fc9ca65174869299abd092f17357d83e6f93df388837359033d33150aee59d7fb663f51f2753e2ed22b7b7ec05750f69d705866274cc55e539f726e1a5bfe0cb27835a92e29007ddb78b424c6e4", 0xbd}], 0x3, &(0x7f0000002880)=[@ip_retopts={{0x9c, 0x0, 0x7, {[@lsrr={0x83, 0x27, 0xd5, [@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @rand_addr=0x64010101, @empty, @broadcast, @rand_addr=0x64010101, @empty, @multicast1, @multicast2]}, @generic={0x83, 0xf, "94c71372c0ed3ff16ea719c48d"}, @rr={0x7, 0x7, 0x15, [@rand_addr=0x64010101]}, @end, @timestamp_prespec={0x44, 0x24, 0xbe, 0x3, 0xb, [{@broadcast, 0x2}, {@rand_addr=0x64010100, 0x3}, {@loopback}, {@loopback, 0x80}]}, @lsrr={0x83, 0x7, 0x93, [@dev={0xac, 0x14, 0x14, 0xb}]}, @timestamp={0x44, 0x1c, 0xc0, 0x0, 0x7, [0x3, 0x8, 0x3, 0x2, 0x3, 0xf8fa]}, @generic={0x82, 0x4, "61f5"}]}}}], 0xa0}, 0x20004080) sendmsg$inet(r2, &(0x7f0000002640)={&(0x7f0000000140)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000002580)=[{&(0x7f0000000180)="122d3adb00debc966ee52728410924e9dbad722bd9b6577d68ac3b54da", 0x1d}, {&(0x7f00000001c0)="cf3d6347e137628207bc99a1877806d24eadb53226719401f81c6f3732d64910a1f619e0cb", 0x25}, {&(0x7f0000000200)="d0d73d0dac1fd4ffe9bcefc160973ae5528a8de89ef0ef737df91becbc457efd43d5c09d7bfbf95329266398344e7e1d3cf59dbf749db91f2b120b465409fc890a5a7a43862b3b00dc404394", 0x4c}, {&(0x7f0000000280)="281a5633d991cd9ece465a8f01362516013ec38f718dbbccdd8da92dbd30177a791f14444347e5e1171287cab3b425038ff9c8387c6b6b594075855eae5bc2f766638f12e11ba0ef66a3d98b22b2ae4f7b9ab66334dc916a4493a2bf1bf6c795f453240fc9b3088b8cd55393d6f8b120ecae03590b4e39acecf9405a5c09e82d07e16d9e6d8fe36a1556", 0x8a}, {&(0x7f0000000340)="575291c9865fe58c713e52ff079ae8587549a4c40342fe5376907677f7495111d0f1076e0a9acaa6b7fd0887a1ee934a8ffcf07e64818fc82aded80d7c6143dc", 0x40}, {&(0x7f0000000580)="be7a29c7828520988f8bc04e5076c60602e3ebd654b72534614973ea2ef3c8c634e26400347d012e94d5c9781ae8a825173e393961fd81bf5347bc10e56ee352e567eaddccb36385612bf223ef9f4323739fd7c78244306101f70bdaafde8e8e94c5b0f6f0a9458650f7687994ea713406420b6dbe4fe19be656aef984a44d88b2f7ca63f2fd95afb0ea1e7827789e55fa92bd42e55a258aead59fcbc0659975ae27c07e5d263b873df4c2187ef4e2c391dff7e799aae39555b9a40f6e2254a5c285f716d6b2f4f46bcecadc517230515c59fb8c18a7e48964b57e81939708d66d6cb5137a54ed8163564b15b81be1fdba3a962e6ac5fc1a1ab4dbca94294c935e638caad1d14fc7b3bbef8c1d921af51d6ab67da181054568cdef073088d9480dbf7c8c5dccbdf8830efea611a087cabf50529c330ac611d08befaa431ac2f5f5ee7c47e681d281a810367e707da8c9a470f4d27bbca2d7035a46dfe0351e4067486074437d3e838b275aa40efd5dacca89626f6a8e6265b16302aece9de7fb3f60bd4ef3ea8ae277269a4258062f76a2092ba3f4c09c63f50b7a1faf4c8ea094bd212fcfa126031794025dfcd8df1394c36c03c64208529ac4bf76cda4f772bd5a1774530404230adb18526b301abb095197d93276a15a984559ec8fffc2aceb12bd3069a912291d067599785a2dfd29917b7ec682e07957b6ea210e6a3bceacbd93a27da472e8145b0f38d37c565475cb02f93ab53b641d34d230e46f23e37c7d5042efe0d4044c02b5477d792d9e4b50bdcf03ee4235efcc5f107602a7f6d55a1bf85330124db3be1e3a3a400a4059777e4471c459dffe0a541241e8326644cd3777589c553263c3a99755a63b2023521eb42b68b29fccff118997d7c4918e2e8a96ed6bbcf73b7bdb1d9776c2fe3a78991e4c75aade2a33367fb13c5815de8de7f8565846fd8ee82e6abff27001406b85a373000327fb236fb13b8a6674d845b95cac0cc8584a023e53603ed8fdb5c8c7d6c3359fea7ab8d59df6b9b8cdb3d3b58ad7c7265145b7bd81642d55bc3ea955a38a8f34fdfebcd236ff12cfdb24ea10d8a5020a1d6d19cf6915f12dcdaea3a52d4c6039c8a2b86a7e5b282219d96ce2d9ab2eaaa733e81023a214c17f3d770a69ead36938bacb8349de854f9a0a00633824f06fa68c3be2182b580061306b8885be4f4b2d028e89b26387d368a4e6214f16c18b0d9bed9772a55bde50d1fa4bd9f95de2bd0052cbd9202fee49dfa0df7c80e96035adcaa522291fa284e2e0cbbda1b37d8d832a251f37596bb8ecb7bf7fa01ef753ef60b2a7fc5905fd85d25f63b5f9304a58d5c70e9fdd32d74aa0dfc821b2838f4f55c77eaf993631fe3bb423ea0f7179bc4db10cf1473a185e7216bac14e17161014fb2da325305bd7de76aa4a732b1b5cc0d66ccef3cde97a60d82544b0934c910019ce0fdf25649f90edd61bad55a5e12d8f9c0d0d64ea27c518f831508444a4ba0ad5ae76e32b6b704514504c8942ec8dd49f2365c1ad92faa77412fcfc863e2f65fca30c82792c857f2abb046ac65d765df1826627ac1ec40d062a30385f8812c75c2fbadb4834a6df5b045225a9416d1e7be2c93f5acd213d3ab9ce612fc0b59949534dcd3a9a9d70e26ac31f50010dda1b25d01577defdd91eedb301304ba1645f5f4199c5306bfb3144f9fef55d4373f48f2fc049cbbc4ab7ff0a2b930e016c1db5dafe562a69540b30d351508e60de5f55742ac46088d2a18fa707acf4976a4982b4457491f79163306b2d414a4794ac6afc3a0ee9bfd7cd039070ba048b2a965e3ef50e54ff044c2548d88e6f01b254587553fea958ed9ae2e3069fa81f80efdbe50b19b2ef9cdb2dd03afefd7957008f674496ff21fb1ddb769ecff9aa0e39cd79210056e79d320347f9fb421166640e73e8a7633c5e242cc521d8e02cdf72e3af33d550c4f1596763f9db17f390228451d3b5b516808a8aaff958925290c190a3497cd2d88a280e23061bfa44fe78cea3e8d73bfed594d3da69ab8be4250674253245e26783976e39e104bed554c8e733aa3eab51ba12f2cf0799e3f4b5194f6e7f924417964314e1c82be5dadb8c4ca424def60ae5d5f59108ff1b3383077ef8f80da52b4573550c348ad71ab6a1a2ee6d322b5077318127be1ca2fcee91066ffac0e148228cc633dbc88fcb9ac97391163fae34c725fea9d727e4377f62ed8ea751395e7bd8aa535dc2ec592b723715fe698cc9a95d2a45e74a13f8a7fb26bfc31b7576cb45900792fa8fd017dd2c9b629c602f0ce2e297938bfb5cdf754333d88738511279d2816b02056fc8ec80479a5b9a68bc22a9eba89d9521c93f99687d3e26fb2bd0d614f1e6e566f2b4265151db777a4c9d240baa454b5f40a284511c145dbb2890983ea1c622e8d6a76c9bd15109f06dadc8a7986a1686318382c27bdee48badbf6418794806026f97e28fc84db382524f12761088e17f232eda1adebe7b67ed509914e10a0cf64fa8d8936fd70a7e4a3327573c802c3b7a16e33cb49d9d2782bb2b7f1d1c6015f07ec0c7b9c57d2b002297f2c6e9cafce950a471e741a80340f8f950f96687c296d4d6185307d90b000b7fb200525957a2ae267c898f611e2cdac957873191a7a511f761cdacdb4c43ced601c19686b966751c21a9b79b657b312aba25038caeb137eb963182df25ebf45dd8201322865fa3d28b604d4a3744eaf3e4e9a517ed2258a7ddfe7c5f2118074674e3eb91f4a0bf2d4752a7c315ac50e51e06ed56b1c34e156df87f50bcdf5456ba1682f3015bb957a0702215fa49d411c182af5da7a9b6d5557731f56415386e5e710b9a97c3ff3b2b0c9a253eaa607318920bcce0f8f2d2c3f11abd51fbc12b03c06cef31fcc4ce0ad9523e8e16b96c095bfb55810361498d7a5fef5839758b32190111162e40ec4059fddc136f15045f1dacc3a68936f4c94fde4b8ed8368a014f15990bca14cccf25f8321e7f5518b43dd86c10f9459d93afb5dfd850ae028873292e8039ac81f122aef5fdd80a02b1ca50622183da07326158ec638b7ada01e1093a0c109fc592e86be05bfd9648ba9a0d6d4ef896b9d0f5ec16f4946e30da2efd9ebee849176af973f22b66a80ed96f72bba8d1cc5b90e3b2d7d0f78ee778aa024935260781eef430d06336b2d5c1bd1cf2bbeedb00f1fc0b8ad21df3bfb95f18d126e6421f52949d2c2035ec4c604457728c4be9518c06831472dccf6c1d5edd6a0c827d43eed74ed5e5e294ffcdcae255c5d9695fa05be342ab3cde600473728287058624c56c5fea9c189e8d047b1f0381ad11d0b48e0d7f2e63818b14e8ff2ce6d46350d288cb4539df724b6b0c5b0be9b4a3a83ca630777c51a7ac54346914e726dc8151304cdd62947b2e1fa4d33f1ffefa733ab79fdaf52070fcc99b944d4b71284cee740a5b2d5c84cbd46769ccd1e1e7b71999c277e0667d48490df4650ffd1e13435f560a43ce5dc5b80cc0a444d0e0abe517d4c036fa3da9cf6ff62c221eedee04477f18530221490d7c37b1fa6d119eb370d356bc57938af6d5dfa2515fc167613e4642cebd10d7a95f7606f47f8d201dcff4bf45287c61304bd64b124c7931a334ca99c0c2c1ed720ab48f2e5a98ea3c6e280ab439384e164fbde4b07f300acfc271dd8b7f4e9fe3b4d0192b3edadc9bf661c400d587fcfe1016b7c681e93cdc4fb34c2a8fd69a1d1fb5df25d8a62641ed451c41fa0a750bd8fb8d08ad82ae818ee4bf8d35bdb008508aeb1848706afcb01fa517d71fae4720b6e96e60eb3acd3793b24a0b24cf1a755e3ad68165f19cccc0983364e6861ae9017597e6aeb6dd12cbe1f6367e32852179045e559ab2c2f83f2f5af1d1e539e13b41def051d2cd930dd29840fcef7320d117b0fc25204f5d34e3a3cedd232b17b743c19933a4861e502e5452a04e2504422e9be819915c4e553bd63cedeb06a6fd35ef3d96f81a91c12026ed3655d1a3077e1ddfa70915560b9a904fa93a977553eab536dc86de6c3f8b41670ffa0c324179d38c802206db4c43fb7f3f07fffc85f7ff6e5d2d70392382f9ec21e7405582a303afd3764360632528f9fbf4f8fb8ac162a21c95fe90c22afed5f9d83fee2ec166720d230964d08ffb6b96c2237ad311f09e6c36d75b9bbcbeb564242a672437977f30a0c8dab7c216cc9638b819a2450f39d238796711f978a5af529276f5eb293a8eea5c0e8948329ee3d366ef35612b3bd7ebe20fd6a1c3d61ff08a0d215a40d8648c896c6e03f2083cc68a086d1c89d849139559b8613f2899b18b95e38824a9514c3d49963194d19bea5b1969522bb9fc5cf1b359980a3402a5f7c74b4106cfe87b0fef51f71a639706c4c8cf2a9c0bceac51946f5f9cb299b6b6cf264e57c7d490f7b2c3fbe3d4f106d0ecd593d894f4e1614d1d1b000c56e86776027a768c8e7bfc65f868ab754e523317a195ef7ce076aa0df924e8eae66efead8ab91cfa8d5803279b776437241027fcd2df40977cdde57a425c0f490b7976f393fe50cb7a082c391f9c9145b16234401eeab981bb0cef7c26e151ec66b4586df8c81eb6601425bf8453f3821bbb2b8d04fe99ace8107841cd167ef04eeb24f1da4da99ba5d39c02b5ed78e385661141f78fba2b1331c41d1eb80e16d8563ce942439eefc9e5e055f2ecc526aeb39b8d0a7a6ed2602e5e082a8d681303200bd51ec7a7c66cbf5530e2b48adb1a3b873308293257a1b50f1dc1ea3817530b2796df8027c12c1d098578122d7ad6c4cd6e12e8e88b6b5baf47e0174e8423160a121a707cf1255030b788f457eef75c8e65abf1b70c85a90cbe851f56e1cb1ff53b95be749786f6cdb6a88a7391247ee3529840eff9816cc543b2dcde743231436975a56bc0ba82b832be3edb4e510b75fceb926dadf8eb4250bb1888b32df2b8b7e3219a8cf7fe6d52a24fdb4de05fb0e32e5b6b3a4b5fa4e7e98329ed5a5aa9594e6a70a6cff27549d0c88214b37165f703cbeb16d27c2e38bf73a2dd07afce35798f0febcbdc0b7cdf3485a54f906fde2e527d7027434df24e6a927579402a917834b5fdbcbc3ce7515d2b4be66a10413649027eb14fce2bd1a68aaacba548a88d480296e42b227d20b4f374ddde1394b3695870d5c177c2e7b73bc62b625ab1f6379139d7a8a4457975e9ea6e7e307464462a784e1604895093295a93ef23d9a7b1c1a08895985eb6a082ede88fe7c46532ca4244d88a3c15443c0c48db4d09a1f007c489781e893f96b1cf7a021d18fc4e3960a21cd0d64dbe4a3237b8817876611ffc28f5503bb8668ed7056109594cd39e7b03a20c66778a39c2bbdf0d3a9c4b55f8934f86405f4eba4dfe82577c388f02ec83b56db8a6e0128e8e2a65f9f55396661fffb54ed450b853403cf0ec203210cbf8ba59325d3121eb5aa8fd68a64c08de844d02d14542edad30a4ce2e9011e09d0d35fd09fecf4e79370a5cea8fe0e5a8524d5184184a891010dde73f38487315c7a84841362ecbcccb19c756d851582256b6166aaeaddee97ac7ef642c6509f16836b1ced2e189ed0b7a544e3b0c0c9638a347e63dda6e44951b222c03d909625698b25a49eeb8d6f90f25c7458cf4f6604e5d034f43be12d1164960f1897b732038c0ffa08e1ad4e68414378979405fb0d2d359caa5ac418ec61e2c6a2e6ea5a535b4d65a0f4859f6fa9c9e18c06b2571d058b4f0ea1c5d419f32a57a8c44d7655993391d3dc2ed7f41ebcd22a44fbd6f3be72bf6", 0x1000}, {&(0x7f0000001580)="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", 0x1000}, {&(0x7f0000000380)="78a254e78f45b44e1404be5cf84e4254e8afe6e0b57963c8fff88387b3ceb8bd28192cdc49f1727fafa12f074d2366b2ce62f8d24940e8c43d3f173ee402d36af08bac6be692674d420065762563b809465358824ed044a24bb92e152b4af4a7969543c43c5568c1093b", 0x6a}, {&(0x7f0000000400)="54bf9a609d27029abd3840c21a74185407e698dc809bd66296bad9262d9bece91fae501e46cde8ab835ff369098e4be0ea8f616921b9d70c08aeef6c126939ad882d6a877cf5c80df1cc7824883691ca35ab8db3a4a14e168971ea700e5d45238832c9d22ace6ae3956568eeea45c5d1e71a33bbf6e4e20bf587a205c65535585804e1873aee31d147b083a480e68a3a0ed45b2d48488ffe8f652963ecf37559e4a6f271bcd27859263b1fe7815045dfab413a5658b2eae6eb922739948c45c1a8a3af3ebf0cf111e224f7a955872b368a31a00d3c369486083d7d809fbe", 0xde}, {&(0x7f0000000500)="ace3712fccfdf1f01bbce4697d4ce7ad6ec37c3e30c82c65396923d3a6c87625", 0x20}], 0xa}, 0x0) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000040)='syz1\x00', 0x1ff) [ 2589.252907][T13619] name failslab, interval 1, probability 0, space 0, times 0 [ 2589.272183][T13619] CPU: 0 PID: 13619 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2589.283389][T13619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2589.293652][T13619] Call Trace: [ 2589.296764][T13619] [ 2589.299543][T13619] dump_stack_lvl+0x151/0x1b7 [ 2589.304060][T13619] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2589.309350][T13619] dump_stack+0x15/0x17 [ 2589.313340][T13619] should_fail+0x3c0/0x510 [ 2589.317593][T13619] __should_failslab+0x9f/0xe0 [ 2589.322191][T13619] should_failslab+0x9/0x20 [ 2589.326531][T13619] kmem_cache_alloc+0x4f/0x2f0 [ 2589.331134][T13619] ? anon_vma_fork+0x1b9/0x4f0 [ 2589.335746][T13619] anon_vma_fork+0x1b9/0x4f0 [ 2589.340247][T13619] dup_mmap+0x750/0xea0 [ 2589.344417][T13619] ? __delayed_free_task+0x20/0x20 [ 2589.349360][T13619] ? mm_init+0x807/0x960 [ 2589.353440][T13619] dup_mm+0x91/0x330 [ 2589.357176][T13619] copy_mm+0x108/0x1b0 [ 2589.361085][T13619] copy_process+0x1295/0x3250 [ 2589.365592][T13619] ? proc_fail_nth_write+0x213/0x290 [ 2589.370726][T13619] ? proc_fail_nth_read+0x220/0x220 [ 2589.375846][T13619] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2589.380952][T13619] ? vfs_write+0x9af/0x1050 [ 2589.385371][T13619] ? vmacache_update+0xb7/0x120 [ 2589.390144][T13619] kernel_clone+0x22d/0x990 [ 2589.394755][T13619] ? file_end_write+0x1b0/0x1b0 [ 2589.399443][T13619] ? __kasan_check_write+0x14/0x20 [ 2589.404387][T13619] ? create_io_thread+0x1e0/0x1e0 [ 2589.409242][T13619] ? __mutex_lock_slowpath+0x10/0x10 [ 2589.414366][T13619] __x64_sys_clone+0x289/0x310 [ 2589.418969][T13619] ? __do_sys_vfork+0x130/0x130 [ 2589.423648][T13619] ? debug_smp_processor_id+0x17/0x20 [ 2589.428855][T13619] do_syscall_64+0x44/0xd0 [ 2589.433209][T13619] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2589.438921][T13619] RIP: 0033:0x7fd2e6d030d9 [ 2589.443174][T13619] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:07:09 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x600000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2589.462614][T13619] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2589.470858][T13619] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2589.478675][T13619] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2589.486654][T13619] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2589.494464][T13619] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2589.502358][T13619] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2589.510182][T13619] 04:07:09 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x9903}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:09 executing program 1: r0 = syz_clone(0x27248180, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/user\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x420500, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000080)) syz_clone(0x27248180, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/user\x00') (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x420500, 0x0) (async) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000080)) (async) 04:07:09 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x601000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:09 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x102000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) 04:07:09 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) 04:07:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) 04:07:09 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x602000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) 04:07:09 executing program 1: r0 = syz_clone(0x27248180, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/user\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x420500, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000080)) syz_clone(0x27248180, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/user\x00') (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x420500, 0x0) (async) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000080)) (async) 04:07:09 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x603000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) socketpair(0x2c, 0x800, 0x3, &(0x7f0000000000)) [ 2589.603002][T13647] FAULT_INJECTION: forcing a failure. [ 2589.603002][T13647] name failslab, interval 1, probability 0, space 0, times 0 [ 2589.638605][T13647] CPU: 0 PID: 13647 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2589.648685][T13647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2589.658669][T13647] Call Trace: [ 2589.661791][T13647] [ 2589.664569][T13647] dump_stack_lvl+0x151/0x1b7 [ 2589.669253][T13647] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2589.674555][T13647] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2589.680795][T13647] dump_stack+0x15/0x17 [ 2589.684852][T13647] should_fail+0x3c0/0x510 [ 2589.689039][T13647] __should_failslab+0x9f/0xe0 [ 2589.693721][T13647] should_failslab+0x9/0x20 [ 2589.698072][T13647] kmem_cache_alloc+0x4f/0x2f0 [ 2589.702675][T13647] ? anon_vma_fork+0xf7/0x4f0 [ 2589.707181][T13647] anon_vma_fork+0xf7/0x4f0 [ 2589.711528][T13647] ? anon_vma_name+0x43/0x70 [ 2589.715949][T13647] dup_mmap+0x750/0xea0 [ 2589.719961][T13647] ? __delayed_free_task+0x20/0x20 [ 2589.724890][T13647] ? mm_init+0x807/0x960 [ 2589.728977][T13647] dup_mm+0x91/0x330 [ 2589.732700][T13647] copy_mm+0x108/0x1b0 [ 2589.736689][T13647] copy_process+0x1295/0x3250 [ 2589.741215][T13647] ? proc_fail_nth_write+0x213/0x290 [ 2589.746339][T13647] ? proc_fail_nth_read+0x220/0x220 [ 2589.751372][T13647] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2589.756398][T13647] ? vfs_write+0x9af/0x1050 [ 2589.760731][T13647] ? vmacache_update+0xb7/0x120 [ 2589.765418][T13647] kernel_clone+0x22d/0x990 [ 2589.769771][T13647] ? file_end_write+0x1b0/0x1b0 [ 2589.774440][T13647] ? __kasan_check_write+0x14/0x20 [ 2589.779387][T13647] ? create_io_thread+0x1e0/0x1e0 [ 2589.784262][T13647] ? __mutex_lock_slowpath+0x10/0x10 [ 2589.789375][T13647] __x64_sys_clone+0x289/0x310 [ 2589.794086][T13647] ? __do_sys_vfork+0x130/0x130 [ 2589.798774][T13647] ? debug_smp_processor_id+0x17/0x20 [ 2589.804056][T13647] do_syscall_64+0x44/0xd0 [ 2589.808328][T13647] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2589.814059][T13647] RIP: 0033:0x7fd2e6d030d9 [ 2589.818659][T13647] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2589.838535][T13647] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2589.846862][T13647] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2589.854663][T13647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2589.862482][T13647] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2589.870525][T13647] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2589.878560][T13647] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2589.886349][T13647] 04:07:10 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0xa207}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) socketpair(0x2c, 0x800, 0x3, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) socketpair(0x2c, 0x800, 0x3, &(0x7f0000000000)) (async) 04:07:10 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x604000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:10 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x107000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:10 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1}, 0x80) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000000)=r2, 0x12) 04:07:10 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) 04:07:10 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x605000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) socketpair(0x2c, 0x800, 0x3, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) socketpair(0x2c, 0x800, 0x3, &(0x7f0000000000)) (async) 04:07:10 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x700000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:10 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1}, 0x80) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000000)=r2, 0x12) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1}, 0x80) (async) getpid() (async) write$cgroup_pid(r1, &(0x7f0000000000)=r2, 0x12) (async) 04:07:10 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1}, 0x80) (async) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000000)=r2, 0x12) 04:07:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x1, 0x3, 0x0, 0x3}], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) [ 2589.958070][T13676] FAULT_INJECTION: forcing a failure. [ 2589.958070][T13676] name failslab, interval 1, probability 0, space 0, times 0 [ 2590.013614][T13676] CPU: 1 PID: 13676 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2590.023713][T13676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2590.033796][T13676] Call Trace: [ 2590.036906][T13676] [ 2590.039678][T13676] dump_stack_lvl+0x151/0x1b7 [ 2590.044282][T13676] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2590.049821][T13676] dump_stack+0x15/0x17 [ 2590.053745][T13676] should_fail+0x3c0/0x510 [ 2590.058000][T13676] __should_failslab+0x9f/0xe0 [ 2590.062611][T13676] should_failslab+0x9/0x20 [ 2590.066953][T13676] kmem_cache_alloc+0x4f/0x2f0 [ 2590.071634][T13676] ? vm_area_dup+0x26/0x1d0 [ 2590.076046][T13676] ? __kasan_check_read+0x11/0x20 [ 2590.080918][T13676] vm_area_dup+0x26/0x1d0 [ 2590.085076][T13676] dup_mmap+0x6b8/0xea0 [ 2590.089087][T13676] ? __delayed_free_task+0x20/0x20 [ 2590.094023][T13676] ? mm_init+0x807/0x960 [ 2590.098127][T13676] dup_mm+0x91/0x330 [ 2590.101825][T13676] copy_mm+0x108/0x1b0 [ 2590.105740][T13676] copy_process+0x1295/0x3250 [ 2590.110245][T13676] ? proc_fail_nth_write+0x213/0x290 [ 2590.115373][T13676] ? proc_fail_nth_read+0x220/0x220 [ 2590.120395][T13676] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2590.125337][T13676] ? vfs_write+0x9af/0x1050 [ 2590.129677][T13676] ? vmacache_update+0xb7/0x120 [ 2590.134366][T13676] kernel_clone+0x22d/0x990 [ 2590.138705][T13676] ? file_end_write+0x1b0/0x1b0 [ 2590.143393][T13676] ? __kasan_check_write+0x14/0x20 [ 2590.148353][T13676] ? create_io_thread+0x1e0/0x1e0 [ 2590.153219][T13676] ? __mutex_lock_slowpath+0x10/0x10 [ 2590.158320][T13676] __x64_sys_clone+0x289/0x310 [ 2590.162930][T13676] ? __do_sys_vfork+0x130/0x130 [ 2590.167607][T13676] ? debug_smp_processor_id+0x17/0x20 [ 2590.172916][T13676] do_syscall_64+0x44/0xd0 [ 2590.177247][T13676] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2590.182977][T13676] RIP: 0033:0x7fd2e6d030d9 [ 2590.187242][T13676] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2590.206766][T13676] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2590.215108][T13676] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2590.223603][T13676] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2590.231490][T13676] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2590.239306][T13676] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2590.247115][T13676] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2590.255105][T13676] 04:07:10 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0xcc03}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:10 executing program 1: syz_clone(0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:10 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x701000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:10 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x201000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x1, 0x3, 0x0, 0x3}], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 04:07:10 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) 04:07:10 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x702000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x1, 0x3, 0x0, 0x3}], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 04:07:10 executing program 1: syz_clone(0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:10 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x703000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x7, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x19594908, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x1, 0x6, 0x8, 0xb30, 0x8}, @map_idx_val={0x18, 0xd038b4741623a0e8, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, @ldst={0x3, 0x3, 0x0, 0x4, 0xa, 0x2, 0xffffffffffffffff}], &(0x7f0000000040)='GPL\x00', 0x200000, 0x25, &(0x7f0000000080)=""/37, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x3, 0x4, 0x49}, 0x10}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2, &(0x7f0000000200)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x100}], &(0x7f0000000100)='GPL\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0xe}, 0x10}, 0x80) [ 2590.333024][T13713] FAULT_INJECTION: forcing a failure. [ 2590.333024][T13713] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2590.352796][T13713] CPU: 0 PID: 13713 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2590.363313][T13713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2590.373289][T13713] Call Trace: [ 2590.376411][T13713] [ 2590.379189][T13713] dump_stack_lvl+0x151/0x1b7 [ 2590.383703][T13713] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2590.388999][T13713] dump_stack+0x15/0x17 [ 2590.392997][T13713] should_fail+0x3c0/0x510 [ 2590.397343][T13713] should_fail_alloc_page+0x58/0x70 [ 2590.402449][T13713] __alloc_pages+0x1de/0x7c0 [ 2590.408787][T13713] ? __count_vm_events+0x30/0x30 [ 2590.413558][T13713] pte_alloc_one+0x73/0x1b0 [ 2590.417898][T13713] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2590.422930][T13713] __pte_alloc+0x86/0x350 [ 2590.427096][T13713] ? is_module_text_address+0xe1/0x140 [ 2590.432390][T13713] ? free_pgtables+0x210/0x210 [ 2590.437425][T13713] ? __kernel_text_address+0x9a/0x110 [ 2590.442633][T13713] ? unwind_get_return_address+0x4c/0x90 [ 2590.448191][T13713] copy_pte_range+0x1b1f/0x20b0 [ 2590.452895][T13713] ? stack_trace_save+0x12d/0x1f0 [ 2590.457750][T13713] ? __kunmap_atomic+0x80/0x80 [ 2590.462333][T13713] ? dup_mmap+0x750/0xea0 [ 2590.466499][T13713] ? dup_mm+0x91/0x330 [ 2590.470412][T13713] ? copy_mm+0x108/0x1b0 [ 2590.474498][T13713] ? copy_process+0x1295/0x3250 [ 2590.479170][T13713] ? kernel_clone+0x22d/0x990 [ 2590.483684][T13713] ? __x64_sys_clone+0x289/0x310 [ 2590.488546][T13713] ? do_syscall_64+0x44/0xd0 [ 2590.492976][T13713] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2590.499303][T13713] copy_page_range+0xc1e/0x1090 [ 2590.504076][T13713] ? pfn_valid+0x1e0/0x1e0 [ 2590.508340][T13713] dup_mmap+0x99f/0xea0 [ 2590.512421][T13713] ? __delayed_free_task+0x20/0x20 [ 2590.517357][T13713] ? mm_init+0x807/0x960 [ 2590.521460][T13713] dup_mm+0x91/0x330 [ 2590.525259][T13713] copy_mm+0x108/0x1b0 [ 2590.529158][T13713] copy_process+0x1295/0x3250 [ 2590.533673][T13713] ? proc_fail_nth_write+0x213/0x290 [ 2590.538816][T13713] ? proc_fail_nth_read+0x220/0x220 [ 2590.543924][T13713] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2590.548867][T13713] ? vfs_write+0x9af/0x1050 [ 2590.553379][T13713] ? vmacache_update+0xb7/0x120 [ 2590.558070][T13713] kernel_clone+0x22d/0x990 [ 2590.562402][T13713] ? file_end_write+0x1b0/0x1b0 [ 2590.567430][T13713] ? __kasan_check_write+0x14/0x20 [ 2590.572491][T13713] ? create_io_thread+0x1e0/0x1e0 [ 2590.578064][T13713] ? __mutex_lock_slowpath+0x10/0x10 [ 2590.583157][T13713] __x64_sys_clone+0x289/0x310 [ 2590.588047][T13713] ? __do_sys_vfork+0x130/0x130 [ 2590.592711][T13713] ? debug_smp_processor_id+0x17/0x20 [ 2590.598130][T13713] do_syscall_64+0x44/0xd0 [ 2590.602539][T13713] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2590.608363][T13713] RIP: 0033:0x7fd2e6d030d9 [ 2590.612872][T13713] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:07:10 executing program 1: syz_clone(0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 04:07:10 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:10 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x704000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x7, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x19594908, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x1, 0x6, 0x8, 0xb30, 0x8}, @map_idx_val={0x18, 0xd038b4741623a0e8, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, @ldst={0x3, 0x3, 0x0, 0x4, 0xa, 0x2, 0xffffffffffffffff}], &(0x7f0000000040)='GPL\x00', 0x200000, 0x25, &(0x7f0000000080)=""/37, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x3, 0x4, 0x49}, 0x10}, 0x80) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2, &(0x7f0000000200)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x100}], &(0x7f0000000100)='GPL\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0xe}, 0x10}, 0x80) (rerun: 32) [ 2590.632633][T13713] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2590.640958][T13713] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2590.648774][T13713] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2590.656706][T13713] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2590.664600][T13713] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2590.672391][T13713] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2590.680206][T13713] 04:07:10 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x500000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:10 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x705000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:10 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000000)="70ac3862b9821a5c001dc649cda2a2ce3725d91fa8f7de2806c4f12a4541ffac23db39c60fc7702977630cd0aa194e0160a5b4693357ba7c0811819388b1a94841c1515cdf0148eb23c3cf36bdcbf6ffba2908e41edb699a892c76dbd2a3259caf1bc2d454c32ef97452222d0e305d77de6b4e20f10ae5d52f1e8c0b5b33fb0654809834f6dbe92d6a268243da9b415aa8e013f1d154061ae283f79b9b0ad30e"}, 0x20) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:10 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 75) 04:07:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x7, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x19594908, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x1, 0x6, 0x8, 0xb30, 0x8}, @map_idx_val={0x18, 0xd038b4741623a0e8, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, @ldst={0x3, 0x3, 0x0, 0x4, 0xa, 0x2, 0xffffffffffffffff}], &(0x7f0000000040)='GPL\x00', 0x200000, 0x25, &(0x7f0000000080)=""/37, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x3, 0x4, 0x49}, 0x10}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2, &(0x7f0000000200)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x100}], &(0x7f0000000100)='GPL\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0xe}, 0x10}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x7, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x19594908, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x1, 0x6, 0x8, 0xb30, 0x8}, @map_idx_val={0x18, 0xd038b4741623a0e8, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, @ldst={0x3, 0x3, 0x0, 0x4, 0xa, 0x2, 0xffffffffffffffff}], &(0x7f0000000040)='GPL\x00', 0x200000, 0x25, &(0x7f0000000080)=""/37, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x3, 0x4, 0x49}, 0x10}, 0x80) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2, &(0x7f0000000200)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x100}], &(0x7f0000000100)='GPL\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0xe}, 0x10}, 0x80) (async) 04:07:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x30}, 0x10) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0)={r2, r1}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2, &(0x7f0000000080)=@raw=[@map_fd={0x18, 0x9, 0x1, 0x0, r1}], &(0x7f0000000100)='syzkaller\x00', 0x6, 0x102, &(0x7f0000000140)=""/258, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0xffffffff}, 0x10}, 0x80) 04:07:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x800000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x801000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x30}, 0x10) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0)={r2, r1}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2, &(0x7f0000000080)=@raw=[@map_fd={0x18, 0x9, 0x1, 0x0, r1}], &(0x7f0000000100)='syzkaller\x00', 0x6, 0x102, &(0x7f0000000140)=""/258, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0xffffffff}, 0x10}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x30}, 0x10) (async) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0)={r2, r1}, 0xc) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2, &(0x7f0000000080)=@raw=[@map_fd={0x18, 0x9, 0x1, 0x0, r1}], &(0x7f0000000100)='syzkaller\x00', 0x6, 0x102, &(0x7f0000000140)=""/258, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0xffffffff}, 0x10}, 0x80) (async) [ 2590.755075][T13744] FAULT_INJECTION: forcing a failure. [ 2590.755075][T13744] name failslab, interval 1, probability 0, space 0, times 0 [ 2590.809206][T13744] CPU: 1 PID: 13744 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2590.819282][T13744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2590.829185][T13744] Call Trace: [ 2590.833256][T13744] [ 2590.836207][T13744] dump_stack_lvl+0x151/0x1b7 [ 2590.840732][T13744] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2590.846023][T13744] dump_stack+0x15/0x17 [ 2590.850375][T13744] should_fail+0x3c0/0x510 [ 2590.854697][T13744] __should_failslab+0x9f/0xe0 [ 2590.859291][T13744] should_failslab+0x9/0x20 [ 2590.863635][T13744] kmem_cache_alloc+0x4f/0x2f0 [ 2590.868245][T13744] ? anon_vma_clone+0xa1/0x4f0 [ 2590.872938][T13744] anon_vma_clone+0xa1/0x4f0 [ 2590.877358][T13744] anon_vma_fork+0x91/0x4f0 [ 2590.881871][T13744] ? anon_vma_name+0x43/0x70 [ 2590.886285][T13744] dup_mmap+0x750/0xea0 [ 2590.890629][T13744] ? __delayed_free_task+0x20/0x20 [ 2590.895662][T13744] ? mm_init+0x807/0x960 [ 2590.899745][T13744] dup_mm+0x91/0x330 [ 2590.903474][T13744] copy_mm+0x108/0x1b0 [ 2590.907472][T13744] copy_process+0x1295/0x3250 [ 2590.912252][T13744] ? proc_fail_nth_write+0x213/0x290 [ 2590.917357][T13744] ? proc_fail_nth_read+0x220/0x220 [ 2590.922397][T13744] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2590.927352][T13744] ? vfs_write+0x9af/0x1050 [ 2590.931938][T13744] ? vmacache_update+0xb7/0x120 [ 2590.936784][T13744] kernel_clone+0x22d/0x990 [ 2590.941071][T13744] ? file_end_write+0x1b0/0x1b0 [ 2590.945758][T13744] ? __kasan_check_write+0x14/0x20 [ 2590.950701][T13744] ? create_io_thread+0x1e0/0x1e0 [ 2590.955552][T13744] ? __mutex_lock_slowpath+0x10/0x10 [ 2590.960674][T13744] __x64_sys_clone+0x289/0x310 [ 2590.965277][T13744] ? __do_sys_vfork+0x130/0x130 [ 2590.969961][T13744] ? debug_smp_processor_id+0x17/0x20 [ 2590.975168][T13744] do_syscall_64+0x44/0xd0 [ 2590.979419][T13744] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2590.985154][T13744] RIP: 0033:0x7fd2e6d030d9 [ 2590.989401][T13744] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2591.008995][T13744] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2591.018105][T13744] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2591.026005][T13744] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2591.033809][T13744] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2591.041624][T13744] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2591.049457][T13744] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2591.057440][T13744] 04:07:11 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x2}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000000)="70ac3862b9821a5c001dc649cda2a2ce3725d91fa8f7de2806c4f12a4541ffac23db39c60fc7702977630cd0aa194e0160a5b4693357ba7c0811819388b1a94841c1515cdf0148eb23c3cf36bdcbf6ffba2908e41edb699a892c76dbd2a3259caf1bc2d454c32ef97452222d0e305d77de6b4e20f10ae5d52f1e8c0b5b33fb0654809834f6dbe92d6a268243da9b415aa8e013f1d154061ae283f79b9b0ad30e"}, 0x20) (async, rerun: 32) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 04:07:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x30}, 0x10) (async, rerun: 64) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) (rerun: 64) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r2, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0)={r2, r1}, 0xc) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x2, &(0x7f0000000080)=@raw=[@map_fd={0x18, 0x9, 0x1, 0x0, r1}], &(0x7f0000000100)='syzkaller\x00', 0x6, 0x102, &(0x7f0000000140)=""/258, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0xffffffff}, 0x10}, 0x80) (rerun: 32) 04:07:11 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x701000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x802000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x803000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:11 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 76) 04:07:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r1, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)=""/198, 0xc6}, {&(0x7f0000000240)=""/138, 0x8a}], 0x2}, 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x804000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:11 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x1000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r1, 0x0, 0x0) (async) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)=""/198, 0xc6}, {&(0x7f0000000240)=""/138, 0x8a}], 0x2}, 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x805000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2591.186696][T13812] FAULT_INJECTION: forcing a failure. [ 2591.186696][T13812] name failslab, interval 1, probability 0, space 0, times 0 [ 2591.219937][T13812] CPU: 1 PID: 13812 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2591.230034][T13812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2591.239913][T13812] Call Trace: [ 2591.243041][T13812] [ 2591.245987][T13812] dump_stack_lvl+0x151/0x1b7 [ 2591.250602][T13812] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2591.255882][T13812] dump_stack+0x15/0x17 [ 2591.259874][T13812] should_fail+0x3c0/0x510 [ 2591.264130][T13812] __should_failslab+0x9f/0xe0 [ 2591.268729][T13812] should_failslab+0x9/0x20 [ 2591.273067][T13812] kmem_cache_alloc+0x4f/0x2f0 [ 2591.277674][T13812] ? anon_vma_clone+0xa1/0x4f0 [ 2591.282442][T13812] anon_vma_clone+0xa1/0x4f0 [ 2591.286870][T13812] anon_vma_fork+0x91/0x4f0 [ 2591.291381][T13812] ? anon_vma_name+0x43/0x70 [ 2591.295807][T13812] dup_mmap+0x750/0xea0 [ 2591.299803][T13812] ? __delayed_free_task+0x20/0x20 [ 2591.304746][T13812] ? mm_init+0x807/0x960 [ 2591.309002][T13812] dup_mm+0x91/0x330 [ 2591.312746][T13812] copy_mm+0x108/0x1b0 [ 2591.316861][T13812] copy_process+0x1295/0x3250 [ 2591.321381][T13812] ? proc_fail_nth_write+0x213/0x290 [ 2591.326583][T13812] ? proc_fail_nth_read+0x220/0x220 [ 2591.331619][T13812] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2591.336556][T13812] ? vfs_write+0x9af/0x1050 [ 2591.340894][T13812] ? vmacache_update+0xb7/0x120 [ 2591.345579][T13812] kernel_clone+0x22d/0x990 [ 2591.349921][T13812] ? file_end_write+0x1b0/0x1b0 [ 2591.354605][T13812] ? __kasan_check_write+0x14/0x20 [ 2591.359555][T13812] ? create_io_thread+0x1e0/0x1e0 [ 2591.364478][T13812] ? __mutex_lock_slowpath+0x10/0x10 [ 2591.369534][T13812] __x64_sys_clone+0x289/0x310 [ 2591.374146][T13812] ? __do_sys_vfork+0x130/0x130 [ 2591.379270][T13812] ? debug_smp_processor_id+0x17/0x20 [ 2591.384462][T13812] do_syscall_64+0x44/0xd0 [ 2591.388727][T13812] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2591.394445][T13812] RIP: 0033:0x7fd2e6d030d9 [ 2591.398698][T13812] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2591.418411][T13812] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2591.426672][T13812] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2591.434454][T13812] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2591.442372][T13812] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2591.450174][T13812] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2591.458004][T13812] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2591.465988][T13812] 04:07:11 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x4}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r1, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)=""/198, 0xc6}, {&(0x7f0000000240)=""/138, 0x8a}], 0x2}, 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) sendmsg$inet(r1, 0x0, 0x0) (async) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)=""/198, 0xc6}, {&(0x7f0000000240)=""/138, 0x8a}], 0x2}, 0x3) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) 04:07:11 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x1010000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x900000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r0]}, 0x80) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000000)="70ac3862b9821a5c001dc649cda2a2ce3725d91fa8f7de2806c4f12a4541ffac23db39c60fc7702977630cd0aa194e0160a5b4693357ba7c0811819388b1a94841c1515cdf0148eb23c3cf36bdcbf6ffba2908e41edb699a892c76dbd2a3259caf1bc2d454c32ef97452222d0e305d77de6b4e20f10ae5d52f1e8c0b5b33fb0654809834f6dbe92d6a268243da9b415aa8e013f1d154061ae283f79b9b0ad30e"}, 0x20) (async) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:11 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 77) 04:07:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x901000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/617], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x8, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x5}, 0x10}, 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000500)={&(0x7f0000000440)=""/156, 0x9c, 0x0, &(0x7f0000000580)=""/230, 0xe6}}, 0x10) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @jmp={0x5, 0x0, 0x2, 0x9, 0x3, 0xfffffffffffffffe, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r5, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1e, 0x2, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x2}], &(0x7f0000000080)='syzkaller\x00', 0x80, 0x67, &(0x7f0000000340)=""/103, 0x1f00, 0xd, '\x00', 0x0, 0x20, r3, 0x8, &(0x7f00000003c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x2, 0x60d, 0xffffffc0}, 0x10, r4, r5, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000280)) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000000)=r1) 04:07:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x902000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000780)=ANY=[@ANYBLOB="950036c15823440000000000009d04775ddaaf7204000000e8336d84c7227469a8f9a5f6cdc9d05543ff3ab202097d73f0adb019addf79851e36d4cc4c9deaaed71e7adcad31cdce62ec8c5bb60bd72e5bfa543d9b359bbd0ac805d433725ca8fad10dc750b5391c05c2571f955d7733fcbcb901bb26d6b224a5d3cd09f6c8680ca2545231d9e02aa3ca6e704abac47fbfd3ae0549897a9936b1264e0f308833ac02e44c16372b789b261248ce83b3c07f65075a31520d8bd2d00537b73c145330ce2f7686b286ec41f0f0299e7a4146e5a1dc2036abebb96308c97726632340614eb1e4262de52449e1bc14fdc866f0e594ea204aa96c8f695b25ea7d8cb10ee8f89db1a51181152392b5c69b6def1b12901d3f074132544eb9a0181e5e42b6294b6fc20faa6aa2a993f68cd54b7c8a08aedebbc5b35ffeb9595647ad2e1018bd2b17c37a3ed5a7bc25fea9710f91288132730aa3f5a896683d41054181f9c671c9fefba932d3183517f771bf5401e0e2cf1e0946a59e4352df4af1bd1f7843a8c3aba67541fc3859706413ba23457e4d37a3e0b28dd99c2a43ef5ece376e7f9fe6d121a6be1aa40e283aef71f35fc22a0b0b432bb1c3383d75b5d4275137f320cfbcb8b1458722185b0814d50049aeef14342cebb997b2bcb3b0db72b157dc493879b8fbcb4e51266b6e7c7d488f0677f549ebea934aeb8163d661dfd27baf81c9ccc75a328cf94f818b825833a62fed9350f895d10a05582bc61004bc2d68d1ec5bb830dbb93f1f272371cf817530ac5c8b907295667a9c24254a8f249a4334a3924fa5c1a64e9d8c0fdcbb8941dd6f882662bb9b4e3d9a00"/617], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x8, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x5}, 0x10}, 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000500)={&(0x7f0000000440)=""/156, 0x9c, 0x0, &(0x7f0000000580)=""/230, 0xe6}}, 0x10) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @jmp={0x5, 0x0, 0x2, 0x9, 0x3, 0xfffffffffffffffe, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r5, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1e, 0x2, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x2}], &(0x7f0000000080)='syzkaller\x00', 0x80, 0x67, &(0x7f0000000340)=""/103, 0x1f00, 0xd, '\x00', 0x0, 0x20, r3, 0x8, &(0x7f00000003c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x2, 0x60d, 0xffffffc0}, 0x10, r4, r5, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000280)) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000000)=r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/617], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x8, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x5}, 0x10}, 0x80) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000500)={&(0x7f0000000440)=""/156, 0x9c, 0x0, &(0x7f0000000580)=""/230, 0xe6}}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @jmp={0x5, 0x0, 0x2, 0x9, 0x3, 0xfffffffffffffffe, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r5, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1e, 0x2, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x2}], &(0x7f0000000080)='syzkaller\x00', 0x80, 0x67, &(0x7f0000000340)=""/103, 0x1f00, 0xd, '\x00', 0x0, 0x20, r3, 0x8, &(0x7f00000003c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x2, 0x60d, 0xffffffc0}, 0x10, r4, r5, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000280)) (async) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000000)=r1) (async) 04:07:11 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x2000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000005c0)=r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x9, 0x7a, &(0x7f0000000080)=""/122, 0x41000, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x2, 0xfffffc01, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000240)=r2) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2591.583642][T13840] FAULT_INJECTION: forcing a failure. [ 2591.583642][T13840] name failslab, interval 1, probability 0, space 0, times 0 [ 2591.636687][T13840] CPU: 1 PID: 13840 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2591.647287][T13840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2591.657179][T13840] Call Trace: [ 2591.660301][T13840] [ 2591.663107][T13840] dump_stack_lvl+0x151/0x1b7 [ 2591.667763][T13840] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2591.673145][T13840] dump_stack+0x15/0x17 [ 2591.677137][T13840] should_fail+0x3c0/0x510 [ 2591.681388][T13840] __should_failslab+0x9f/0xe0 [ 2591.686001][T13840] should_failslab+0x9/0x20 [ 2591.690328][T13840] kmem_cache_alloc+0x4f/0x2f0 [ 2591.695017][T13840] ? anon_vma_clone+0xa1/0x4f0 [ 2591.699613][T13840] anon_vma_clone+0xa1/0x4f0 [ 2591.704038][T13840] anon_vma_fork+0x91/0x4f0 [ 2591.708390][T13840] ? anon_vma_name+0x4c/0x70 [ 2591.712805][T13840] dup_mmap+0x750/0xea0 [ 2591.716883][T13840] ? __delayed_free_task+0x20/0x20 [ 2591.721850][T13840] ? mm_init+0x807/0x960 [ 2591.725913][T13840] dup_mm+0x91/0x330 [ 2591.729732][T13840] copy_mm+0x108/0x1b0 [ 2591.733636][T13840] copy_process+0x1295/0x3250 [ 2591.738167][T13840] ? proc_fail_nth_write+0x213/0x290 [ 2591.743305][T13840] ? proc_fail_nth_read+0x220/0x220 [ 2591.748407][T13840] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2591.753692][T13840] ? vfs_write+0x9af/0x1050 [ 2591.758019][T13840] ? vmacache_update+0xb7/0x120 [ 2591.762705][T13840] kernel_clone+0x22d/0x990 [ 2591.767045][T13840] ? file_end_write+0x1b0/0x1b0 [ 2591.771730][T13840] ? __kasan_check_write+0x14/0x20 [ 2591.776676][T13840] ? create_io_thread+0x1e0/0x1e0 [ 2591.781538][T13840] ? __mutex_lock_slowpath+0x10/0x10 [ 2591.786760][T13840] __x64_sys_clone+0x289/0x310 [ 2591.791356][T13840] ? __do_sys_vfork+0x130/0x130 [ 2591.796032][T13840] ? debug_smp_processor_id+0x17/0x20 [ 2591.801240][T13840] do_syscall_64+0x44/0xd0 [ 2591.805492][T13840] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2591.811219][T13840] RIP: 0033:0x7fd2e6d030d9 [ 2591.815487][T13840] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2591.835262][T13840] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2591.843593][T13840] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2591.852021][T13840] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2591.859945][T13840] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2591.868007][T13840] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2591.875830][T13840] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2591.883631][T13840] 04:07:12 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x5}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000005c0)=r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x9, 0x7a, &(0x7f0000000080)=""/122, 0x41000, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x2, 0xfffffc01, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000240)=r2) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) (async) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000005c0)=r1) (async) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x9, 0x7a, &(0x7f0000000080)=""/122, 0x41000, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x2, 0xfffffc01, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) (async) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000240)=r2) (async) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 04:07:12 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x903000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:12 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/617], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x8, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x0, 0x5}, 0x10}, 0x80) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x20, &(0x7f0000000500)={&(0x7f0000000440)=""/156, 0x9c, 0x0, &(0x7f0000000580)=""/230, 0xe6}}, 0x10) (async) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @jmp={0x5, 0x0, 0x2, 0x9, 0x3, 0xfffffffffffffffe, 0x10}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r5, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1e, 0x2, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x2}], &(0x7f0000000080)='syzkaller\x00', 0x80, 0x67, &(0x7f0000000340)=""/103, 0x1f00, 0xd, '\x00', 0x0, 0x20, r3, 0x8, &(0x7f00000003c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x2, 0x60d, 0xffffffc0}, 0x10, r4, r5, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000280)) (async) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000000)=r1) 04:07:12 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:12 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 78) 04:07:12 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x904000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:12 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="4e48dd49eb8483f9b3efef3bd469ac9a27610236345d23ae5252957c", &(0x7f0000000040)=""/32}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) sendmsg$tipc(r1, &(0x7f0000000440)={&(0x7f0000000140)=@name={0x1e, 0x2, 0x1, {{0x41}, 0x2}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000180)="ce22658e2b08028462268b12cb6f1d6bc922408f4ddb82fafead8252199852c0d0e1e184d14531cc38d29897a6fcfac233f9a9dacb6894c33671f1f4b96b4383d167", 0x42}, {&(0x7f0000000200)="81bc5801ad40605295c03858c750e6d7d56c0bea36010ca74590eae033e3d3be46518481b3082c8672265cb1c70e9c2005c016648d9ab1da3efbd053fb602b66d2d9c5beb6d7018af697ccd5e0406e54a7ab284ef75dfc62fe5022042c9d0da0c5528ccbf7ee1883a79273ef9462ee13acf4ec7c108be849bbcb1b3477b18126517a8d8077862dd978d926583b9addaa591db3cdbb970da88d446c6144eb34bcd963b12be3defc52f4931713045545b8e26c3f15a8", 0xb5}, {&(0x7f00000002c0)="345f14b359b0006a38b09ed142718c5093de7ef67ffed84083e54bbddcde86de19c144d6379fbed7dce1faef48986de56383d323a742c0574df4b2960599f2c933f64a43bf7c010d72988257866a86c6c4719caf9877d188e2ea8d445c66713b0cd5e0607b3820674c05186876c674a10ebf2d0e067e72f7598986281402aeee2cc1c4e9c1a3ca2661e32f9e8aef554c297b9505e1a52d0ffc678e1becd787d64429870768", 0xa5}], 0x3, &(0x7f00000003c0)="ad0890f310bfa6a3308481390a2a5b970f2c5b3f9d694792574ad0eef66902cfcddeaa0260b04f1cea4d0d04c072f00d31207f690a553aba52c8c42b4aef6c879231fc702c755c870695a68dfdfd907a8dd9d766e528a4cbaaaa8eb5", 0x5c, 0x40000011}, 0x40000) 04:07:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000005c0)=r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x9, 0x7a, &(0x7f0000000080)=""/122, 0x41000, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x2, 0xfffffc01, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000240)=r2) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) (async) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000005c0)=r1) (async) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x9, 0x7a, &(0x7f0000000080)=""/122, 0x41000, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x2, 0xfffffc01, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) (async) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000240)=r2) (async) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 04:07:12 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x905000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2591.947401][T13885] FAULT_INJECTION: forcing a failure. [ 2591.947401][T13885] name failslab, interval 1, probability 0, space 0, times 0 [ 2591.979628][T13885] CPU: 1 PID: 13885 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2591.989885][T13885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2591.999884][T13885] Call Trace: [ 2592.003016][T13885] [ 2592.005779][T13885] dump_stack_lvl+0x151/0x1b7 [ 2592.010294][T13885] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2592.015594][T13885] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2592.021842][T13885] dump_stack+0x15/0x17 [ 2592.025838][T13885] should_fail+0x3c0/0x510 [ 2592.030086][T13885] __should_failslab+0x9f/0xe0 [ 2592.034686][T13885] should_failslab+0x9/0x20 [ 2592.039026][T13885] kmem_cache_alloc+0x4f/0x2f0 [ 2592.043626][T13885] ? anon_vma_fork+0xf7/0x4f0 [ 2592.048137][T13885] anon_vma_fork+0xf7/0x4f0 [ 2592.052564][T13885] ? anon_vma_name+0x43/0x70 [ 2592.056987][T13885] dup_mmap+0x750/0xea0 [ 2592.060988][T13885] ? __delayed_free_task+0x20/0x20 [ 2592.065930][T13885] ? mm_init+0x807/0x960 [ 2592.070111][T13885] dup_mm+0x91/0x330 [ 2592.073847][T13885] copy_mm+0x108/0x1b0 [ 2592.077844][T13885] copy_process+0x1295/0x3250 [ 2592.082343][T13885] ? proc_fail_nth_write+0x213/0x290 [ 2592.087469][T13885] ? proc_fail_nth_read+0x220/0x220 [ 2592.092503][T13885] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2592.097447][T13885] ? vfs_write+0x9af/0x1050 [ 2592.101782][T13885] ? vmacache_update+0xb7/0x120 [ 2592.106481][T13885] kernel_clone+0x22d/0x990 [ 2592.110826][T13885] ? file_end_write+0x1b0/0x1b0 [ 2592.115773][T13885] ? __kasan_check_write+0x14/0x20 [ 2592.120809][T13885] ? create_io_thread+0x1e0/0x1e0 [ 2592.125752][T13885] ? __mutex_lock_slowpath+0x10/0x10 [ 2592.130872][T13885] __x64_sys_clone+0x289/0x310 [ 2592.135475][T13885] ? __do_sys_vfork+0x130/0x130 [ 2592.140174][T13885] ? debug_smp_processor_id+0x17/0x20 [ 2592.145467][T13885] do_syscall_64+0x44/0xd0 [ 2592.149803][T13885] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2592.155608][T13885] RIP: 0033:0x7fd2e6d030d9 [ 2592.159861][T13885] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2592.179302][T13885] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2592.187545][T13885] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 04:07:12 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x5000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:12 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="4e48dd49eb8483f9b3efef3bd469ac9a27610236345d23ae5252957c", &(0x7f0000000040)=""/32}, 0x20) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) sendmsg$tipc(r1, &(0x7f0000000440)={&(0x7f0000000140)=@name={0x1e, 0x2, 0x1, {{0x41}, 0x2}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000180)="ce22658e2b08028462268b12cb6f1d6bc922408f4ddb82fafead8252199852c0d0e1e184d14531cc38d29897a6fcfac233f9a9dacb6894c33671f1f4b96b4383d167", 0x42}, {&(0x7f0000000200)="81bc5801ad40605295c03858c750e6d7d56c0bea36010ca74590eae033e3d3be46518481b3082c8672265cb1c70e9c2005c016648d9ab1da3efbd053fb602b66d2d9c5beb6d7018af697ccd5e0406e54a7ab284ef75dfc62fe5022042c9d0da0c5528ccbf7ee1883a79273ef9462ee13acf4ec7c108be849bbcb1b3477b18126517a8d8077862dd978d926583b9addaa591db3cdbb970da88d446c6144eb34bcd963b12be3defc52f4931713045545b8e26c3f15a8", 0xb5}, {&(0x7f00000002c0)="345f14b359b0006a38b09ed142718c5093de7ef67ffed84083e54bbddcde86de19c144d6379fbed7dce1faef48986de56383d323a742c0574df4b2960599f2c933f64a43bf7c010d72988257866a86c6c4719caf9877d188e2ea8d445c66713b0cd5e0607b3820674c05186876c674a10ebf2d0e067e72f7598986281402aeee2cc1c4e9c1a3ca2661e32f9e8aef554c297b9505e1a52d0ffc678e1becd787d64429870768", 0xa5}], 0x3, &(0x7f00000003c0)="ad0890f310bfa6a3308481390a2a5b970f2c5b3f9d694792574ad0eef66902cfcddeaa0260b04f1cea4d0d04c072f00d31207f690a553aba52c8c42b4aef6c879231fc702c755c870695a68dfdfd907a8dd9d766e528a4cbaaaa8eb5", 0x5c, 0x40000011}, 0x40000) [ 2592.195357][T13885] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2592.203265][T13885] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2592.211154][T13885] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2592.218967][T13885] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2592.227052][T13885] [ 2592.251076][T13885] ================================================================== [ 2592.259001][T13885] BUG: KASAN: use-after-free in vm_area_free+0x7e/0x230 [ 2592.266001][T13885] Write of size 4 at addr ffff88812dee7d10 by task syz-executor.3/13885 [ 2592.274246][T13885] [ 2592.276416][T13885] CPU: 1 PID: 13885 Comm: syz-executor.3 Not tainted 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2592.286484][T13885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2592.296378][T13885] Call Trace: 04:07:12 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x7}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:12 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:12 executing program 1: syz_clone(0x1258080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2592.299503][T13885] [ 2592.302282][T13885] dump_stack_lvl+0x151/0x1b7 [ 2592.306798][T13885] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2592.312618][T13885] ? panic+0x727/0x727 [ 2592.316704][T13885] ? slab_free_freelist_hook+0xc9/0x1a0 [ 2592.322162][T13885] print_address_description+0x87/0x3d0 [ 2592.327808][T13885] kasan_report+0x1a6/0x1f0 [ 2592.332151][T13885] ? vm_area_free+0x7e/0x230 [ 2592.336567][T13885] ? vm_area_free+0x7e/0x230 [ 2592.340992][T13885] kasan_check_range+0x2aa/0x2e0 [ 2592.346124][T13885] __kasan_check_write+0x14/0x20 [ 2592.350892][T13885] vm_area_free+0x7e/0x230 [ 2592.355141][T13885] dup_mmap+0xbcd/0xea0 [ 2592.359132][T13885] ? __delayed_free_task+0x20/0x20 [ 2592.364444][T13885] ? mm_init+0x807/0x960 [ 2592.368521][T13885] dup_mm+0x91/0x330 [ 2592.372364][T13885] copy_mm+0x108/0x1b0 [ 2592.376268][T13885] copy_process+0x1295/0x3250 [ 2592.380789][T13885] ? proc_fail_nth_write+0x213/0x290 [ 2592.385907][T13885] ? proc_fail_nth_read+0x220/0x220 [ 2592.390940][T13885] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2592.395885][T13885] ? vfs_write+0x9af/0x1050 04:07:12 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x7000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2592.400225][T13885] ? vmacache_update+0xb7/0x120 [ 2592.404913][T13885] kernel_clone+0x22d/0x990 [ 2592.409768][T13885] ? file_end_write+0x1b0/0x1b0 [ 2592.414580][T13885] ? __kasan_check_write+0x14/0x20 [ 2592.419788][T13885] ? create_io_thread+0x1e0/0x1e0 [ 2592.424647][T13885] ? __mutex_lock_slowpath+0x10/0x10 [ 2592.429770][T13885] __x64_sys_clone+0x289/0x310 [ 2592.434366][T13885] ? __do_sys_vfork+0x130/0x130 [ 2592.439149][T13885] ? debug_smp_processor_id+0x17/0x20 [ 2592.444348][T13885] do_syscall_64+0x44/0xd0 [ 2592.449033][T13885] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2592.454840][T13885] RIP: 0033:0x7fd2e6d030d9 [ 2592.459363][T13885] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2592.479380][T13885] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2592.487884][T13885] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2592.495678][T13885] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2592.503579][T13885] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2592.511470][T13885] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2592.519405][T13885] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2592.527194][T13885] [ 2592.530046][T13885] [ 2592.532215][T13885] Allocated by task 13840: [ 2592.536477][T13885] __kasan_slab_alloc+0xb2/0xe0 [ 2592.541185][T13885] kmem_cache_alloc+0x189/0x2f0 [ 2592.545841][T13885] vm_area_dup+0x26/0x1d0 [ 2592.550007][T13885] dup_mmap+0x6b8/0xea0 [ 2592.554349][T13885] dup_mm+0x91/0x330 [ 2592.558088][T13885] copy_mm+0x108/0x1b0 [ 2592.561985][T13885] copy_process+0x1295/0x3250 [ 2592.566499][T13885] kernel_clone+0x22d/0x990 [ 2592.571019][T13885] __x64_sys_clone+0x289/0x310 [ 2592.575706][T13885] do_syscall_64+0x44/0xd0 [ 2592.580145][T13885] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2592.585857][T13885] [ 2592.588021][T13885] Freed by task 13875: [ 2592.592103][T13885] kasan_set_track+0x4c/0x70 [ 2592.596528][T13885] kasan_set_free_info+0x23/0x40 [ 2592.601304][T13885] ____kasan_slab_free+0x126/0x160 [ 2592.606268][T13885] __kasan_slab_free+0x11/0x20 [ 2592.610937][T13885] slab_free_freelist_hook+0xc9/0x1a0 [ 2592.616144][T13885] kmem_cache_free+0x11a/0x2e0 [ 2592.620743][T13885] vm_area_free+0x1ae/0x230 [ 2592.625083][T13885] exit_mmap+0x5dd/0x7a0 [ 2592.629310][T13885] __mmput+0x95/0x300 [ 2592.633263][T13885] mmput+0x50/0x60 [ 2592.636929][T13885] exit_mm+0x50d/0x760 [ 2592.640899][T13885] do_exit+0x63c/0x24d0 [ 2592.644977][T13885] __ia32_sys_exit+0x0/0x40 [ 2592.649319][T13885] do_syscall_64+0x44/0xd0 [ 2592.653579][T13885] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2592.659308][T13885] [ 2592.661470][T13885] The buggy address belongs to the object at ffff88812dee7cb8 [ 2592.661470][T13885] which belongs to the cache vm_area_struct of size 232 [ 2592.675712][T13885] The buggy address is located 88 bytes inside of [ 2592.675712][T13885] 232-byte region [ffff88812dee7cb8, ffff88812dee7da0) [ 2592.689001][T13885] The buggy address belongs to the page: [ 2592.694724][T13885] page:ffffea0004b7b9c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12dee7 [ 2592.705373][T13885] flags: 0x4000000000000200(slab|zone=1) [ 2592.710927][T13885] raw: 4000000000000200 dead000000000100 dead000000000122 ffff888100274d80 [ 2592.719349][T13885] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000 [ 2592.728103][T13885] page dumped because: kasan: bad access detected [ 2592.734646][T13885] page_owner tracks the page as allocated [ 2592.740180][T13885] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 23582, ts 1558762368680, free_ts 1558762044958 [ 2592.756413][T13885] post_alloc_hook+0x1ab/0x1b0 [ 2592.761010][T13885] get_page_from_freelist+0x38b/0x400 [ 2592.766223][T13885] __alloc_pages+0x3a8/0x7c0 [ 2592.770829][T13885] allocate_slab+0x62/0x580 [ 2592.775156][T13885] ___slab_alloc+0x2e2/0x6f0 [ 2592.779688][T13885] __slab_alloc+0x4a/0x90 [ 2592.783928][T13885] kmem_cache_alloc+0x205/0x2f0 [ 2592.788783][T13885] vm_area_dup+0x26/0x1d0 [ 2592.792952][T13885] dup_mmap+0x6b8/0xea0 [ 2592.797114][T13885] dup_mm+0x91/0x330 [ 2592.800846][T13885] copy_mm+0x108/0x1b0 [ 2592.804848][T13885] copy_process+0x1295/0x3250 [ 2592.809351][T13885] kernel_clone+0x22d/0x990 [ 2592.813709][T13885] __x64_sys_clone+0x289/0x310 [ 2592.818294][T13885] do_syscall_64+0x44/0xd0 [ 2592.822556][T13885] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2592.828277][T13885] page last free stack trace: [ 2592.832796][T13885] free_pcp_prepare+0x448/0x450 [ 2592.837571][T13885] free_unref_page+0x9c/0x370 [ 2592.842420][T13885] __free_pages+0xd8/0x100 [ 2592.846674][T13885] free_pages+0x7c/0x90 [ 2592.850678][T13885] tlb_finish_mmu+0x123/0x1f0 [ 2592.855276][T13885] exit_mmap+0x46e/0x7a0 [ 2592.859353][T13885] __mmput+0x95/0x300 [ 2592.863169][T13885] mmput+0x50/0x60 [ 2592.866731][T13885] exit_mm+0x50d/0x760 [ 2592.870630][T13885] do_exit+0x63c/0x24d0 [ 2592.874815][T13885] do_group_exit+0x13a/0x300 [ 2592.879233][T13885] get_signal+0x77e/0x1600 [ 2592.883572][T13885] arch_do_signal_or_restart+0x9f/0x670 [ 2592.889037][T13885] exit_to_user_mode_loop+0xd4/0x110 [ 2592.894332][T13885] syscall_exit_to_user_mode+0x79/0xc0 [ 2592.899714][T13885] do_syscall_64+0x50/0xd0 [ 2592.903969][T13885] [ 2592.906136][T13885] Memory state around the buggy address: [ 2592.911617][T13885] ffff88812dee7c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 2592.919529][T13885] ffff88812dee7c80: fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb fb [ 2592.928038][T13885] >ffff88812dee7d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2592.935912][T13885] ^ [ 2592.940350][T13885] ffff88812dee7d80: fb fb fb fb fc fc fc fc fc fc fc fc fa fb fb fb 04:07:13 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 79) 04:07:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="4e48dd49eb8483f9b3efef3bd469ac9a27610236345d23ae5252957c", &(0x7f0000000040)=""/32}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) sendmsg$tipc(r1, &(0x7f0000000440)={&(0x7f0000000140)=@name={0x1e, 0x2, 0x1, {{0x41}, 0x2}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000180)="ce22658e2b08028462268b12cb6f1d6bc922408f4ddb82fafead8252199852c0d0e1e184d14531cc38d29897a6fcfac233f9a9dacb6894c33671f1f4b96b4383d167", 0x42}, {&(0x7f0000000200)="81bc5801ad40605295c03858c750e6d7d56c0bea36010ca74590eae033e3d3be46518481b3082c8672265cb1c70e9c2005c016648d9ab1da3efbd053fb602b66d2d9c5beb6d7018af697ccd5e0406e54a7ab284ef75dfc62fe5022042c9d0da0c5528ccbf7ee1883a79273ef9462ee13acf4ec7c108be849bbcb1b3477b18126517a8d8077862dd978d926583b9addaa591db3cdbb970da88d446c6144eb34bcd963b12be3defc52f4931713045545b8e26c3f15a8", 0xb5}, {&(0x7f00000002c0)="345f14b359b0006a38b09ed142718c5093de7ef67ffed84083e54bbddcde86de19c144d6379fbed7dce1faef48986de56383d323a742c0574df4b2960599f2c933f64a43bf7c010d72988257866a86c6c4719caf9877d188e2ea8d445c66713b0cd5e0607b3820674c05186876c674a10ebf2d0e067e72f7598986281402aeee2cc1c4e9c1a3ca2661e32f9e8aef554c297b9505e1a52d0ffc678e1becd787d64429870768", 0xa5}], 0x3, &(0x7f00000003c0)="ad0890f310bfa6a3308481390a2a5b970f2c5b3f9d694792574ad0eef66902cfcddeaa0260b04f1cea4d0d04c072f00d31207f690a553aba52c8c42b4aef6c879231fc702c755c870695a68dfdfd907a8dd9d766e528a4cbaaaa8eb5", 0x5c, 0x40000011}, 0x40000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="4e48dd49eb8483f9b3efef3bd469ac9a27610236345d23ae5252957c", &(0x7f0000000040)=""/32}, 0x20) (async) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (async) sendmsg$tipc(r1, &(0x7f0000000440)={&(0x7f0000000140)=@name={0x1e, 0x2, 0x1, {{0x41}, 0x2}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000180)="ce22658e2b08028462268b12cb6f1d6bc922408f4ddb82fafead8252199852c0d0e1e184d14531cc38d29897a6fcfac233f9a9dacb6894c33671f1f4b96b4383d167", 0x42}, {&(0x7f0000000200)="81bc5801ad40605295c03858c750e6d7d56c0bea36010ca74590eae033e3d3be46518481b3082c8672265cb1c70e9c2005c016648d9ab1da3efbd053fb602b66d2d9c5beb6d7018af697ccd5e0406e54a7ab284ef75dfc62fe5022042c9d0da0c5528ccbf7ee1883a79273ef9462ee13acf4ec7c108be849bbcb1b3477b18126517a8d8077862dd978d926583b9addaa591db3cdbb970da88d446c6144eb34bcd963b12be3defc52f4931713045545b8e26c3f15a8", 0xb5}, {&(0x7f00000002c0)="345f14b359b0006a38b09ed142718c5093de7ef67ffed84083e54bbddcde86de19c144d6379fbed7dce1faef48986de56383d323a742c0574df4b2960599f2c933f64a43bf7c010d72988257866a86c6c4719caf9877d188e2ea8d445c66713b0cd5e0607b3820674c05186876c674a10ebf2d0e067e72f7598986281402aeee2cc1c4e9c1a3ca2661e32f9e8aef554c297b9505e1a52d0ffc678e1becd787d64429870768", 0xa5}], 0x3, &(0x7f00000003c0)="ad0890f310bfa6a3308481390a2a5b970f2c5b3f9d694792574ad0eef66902cfcddeaa0260b04f1cea4d0d04c072f00d31207f690a553aba52c8c42b4aef6c879231fc702c755c870695a68dfdfd907a8dd9d766e528a4cbaaaa8eb5", 0x5c, 0x40000011}, 0x40000) (async) 04:07:13 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:13 executing program 1: syz_clone(0x1258080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2592.948234][T13885] ffff88812dee7e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2592.956128][T13885] ================================================================== [ 2592.964026][T13885] Disabling lock debugging due to kernel taint 04:07:13 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa02000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:13 executing program 1: syz_clone(0x1258080, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x9}]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x5, 0x0, 0x2000}, 0x10}, 0x80) 04:07:13 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:13 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x8}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:13 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa03000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x9}]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x5, 0x0, 0x2000}, 0x10}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x9}]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x5, 0x0, 0x2000}, 0x10}, 0x80) (async) 04:07:13 executing program 1: r0 = syz_clone(0x51318800, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.kill\x00', 0x0, 0x0) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r4}, 0x80) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r5, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_pid(r4, &(0x7f0000000340)=r5, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/cgroup\x00') r6 = syz_clone(0x4000000, &(0x7f00000000c0)="e2311528511b489b35ad1d0b568704a7114a729309f51ef29564cb437a9201e9e5fd6e32ef0ede6a8743d627ec204c87277781940fec2ef95186c76a472b1d1f897dcdb950d6f414681b810b5109f00aab2cca52ac62aee2c2fd45854f98b0277f69b4b139d3d6ceef5b2ca3226a19c3fc9f2191cc9c5462540019f15b0f23b8548621f541d282ee189863f5f5c13eed5fe8e8c8efc9", 0x96, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="3641807c65f5cc5c3af77744aa08de5b9fa54b84c256df62777ad9c9213f2140617900f08bf9ad8b6e63f11365efdcb6ff14d785f2bad0a1a090ef10404edda929bb93d034284982a25bd2da74c2d0dc48ae1526a443bdc337f53a4979f1c683dc7f9b546123f325fef2549fa757952c964beef28e6d7a0e531b7ac3cb936e3262e9d06e079f21c6b8b4d36fc54e1f43100dd992d03bf9f1e30972efe2405221c884cde6decfe0a18e2a7c2e5189281d71668337d0c31fef6518c85f2e12ebeeeffd63d5f84ef7d909c35db20c148057b04353c1b46d15cf02fa") write$cgroup_pid(r1, &(0x7f0000000300)=r6, 0x12) [ 2593.078376][T13937] FAULT_INJECTION: forcing a failure. [ 2593.078376][T13937] name failslab, interval 1, probability 0, space 0, times 0 [ 2593.104271][T13937] CPU: 0 PID: 13937 Comm: syz-executor.3 Tainted: G B 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2593.115838][T13937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2593.125731][T13937] Call Trace: [ 2593.129011][T13937] [ 2593.131787][T13937] dump_stack_lvl+0x151/0x1b7 [ 2593.136315][T13937] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2593.141602][T13937] dump_stack+0x15/0x17 [ 2593.145584][T13937] should_fail+0x3c0/0x510 [ 2593.149841][T13937] __should_failslab+0x9f/0xe0 [ 2593.154442][T13937] should_failslab+0x9/0x20 [ 2593.158780][T13937] kmem_cache_alloc+0x4f/0x2f0 [ 2593.163409][T13937] ? anon_vma_fork+0x1b9/0x4f0 [ 2593.167985][T13937] anon_vma_fork+0x1b9/0x4f0 [ 2593.172507][T13937] dup_mmap+0x750/0xea0 [ 2593.176664][T13937] ? __delayed_free_task+0x20/0x20 [ 2593.181612][T13937] ? mm_init+0x807/0x960 [ 2593.185684][T13937] dup_mm+0x91/0x330 [ 2593.189417][T13937] copy_mm+0x108/0x1b0 [ 2593.193351][T13937] copy_process+0x1295/0x3250 [ 2593.197841][T13937] ? proc_fail_nth_write+0x213/0x290 [ 2593.202961][T13937] ? proc_fail_nth_read+0x220/0x220 [ 2593.208007][T13937] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2593.212934][T13937] ? vfs_write+0x9af/0x1050 [ 2593.217269][T13937] ? vmacache_update+0xb7/0x120 [ 2593.221966][T13937] kernel_clone+0x22d/0x990 [ 2593.226297][T13937] ? file_end_write+0x1b0/0x1b0 [ 2593.230991][T13937] ? __kasan_check_write+0x14/0x20 [ 2593.236022][T13937] ? create_io_thread+0x1e0/0x1e0 [ 2593.240883][T13937] ? __mutex_lock_slowpath+0x10/0x10 [ 2593.246108][T13937] __x64_sys_clone+0x289/0x310 [ 2593.250695][T13937] ? __do_sys_vfork+0x130/0x130 [ 2593.255815][T13937] ? debug_smp_processor_id+0x17/0x20 [ 2593.261109][T13937] do_syscall_64+0x44/0xd0 [ 2593.265559][T13937] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2593.271281][T13937] RIP: 0033:0x7fd2e6d030d9 [ 2593.275542][T13937] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2593.295232][T13937] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2593.304006][T13937] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2593.311811][T13937] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2593.319617][T13937] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 04:07:13 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) 04:07:13 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x10000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x9}]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x5, 0x0, 0x2000}, 0x10}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x9}]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x5, 0x0, 0x2000}, 0x10}, 0x80) (async) 04:07:13 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa04000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:13 executing program 1: r0 = syz_clone(0x51318800, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.kill\x00', 0x0, 0x0) (async) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r4}, 0x80) (async) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r5, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_pid(r4, &(0x7f0000000340)=r5, 0x12) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) (async) gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/cgroup\x00') (async) r6 = syz_clone(0x4000000, &(0x7f00000000c0)="e2311528511b489b35ad1d0b568704a7114a729309f51ef29564cb437a9201e9e5fd6e32ef0ede6a8743d627ec204c87277781940fec2ef95186c76a472b1d1f897dcdb950d6f414681b810b5109f00aab2cca52ac62aee2c2fd45854f98b0277f69b4b139d3d6ceef5b2ca3226a19c3fc9f2191cc9c5462540019f15b0f23b8548621f541d282ee189863f5f5c13eed5fe8e8c8efc9", 0x96, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="3641807c65f5cc5c3af77744aa08de5b9fa54b84c256df62777ad9c9213f2140617900f08bf9ad8b6e63f11365efdcb6ff14d785f2bad0a1a090ef10404edda929bb93d034284982a25bd2da74c2d0dc48ae1526a443bdc337f53a4979f1c683dc7f9b546123f325fef2549fa757952c964beef28e6d7a0e531b7ac3cb936e3262e9d06e079f21c6b8b4d36fc54e1f43100dd992d03bf9f1e30972efe2405221c884cde6decfe0a18e2a7c2e5189281d71668337d0c31fef6518c85f2e12ebeeeffd63d5f84ef7d909c35db20c148057b04353c1b46d15cf02fa") write$cgroup_pid(r1, &(0x7f0000000300)=r6, 0x12) 04:07:13 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa05000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x2b, 0x5, 0x7, &(0x7f0000000080)) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 2593.327428][T13937] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2593.335242][T13937] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2593.343058][T13937] 04:07:13 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:13 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x10}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x2b, 0x5, 0x7, &(0x7f0000000080)) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) socketpair(0x2b, 0x5, 0x7, &(0x7f0000000080)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) (async) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) (async) 04:07:13 executing program 1: r0 = syz_clone(0x51318800, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.kill\x00', 0x0, 0x0) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r4}, 0x80) (async) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r5, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) write$cgroup_pid(r4, &(0x7f0000000340)=r5, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) (async) gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/cgroup\x00') (async) r6 = syz_clone(0x4000000, &(0x7f00000000c0)="e2311528511b489b35ad1d0b568704a7114a729309f51ef29564cb437a9201e9e5fd6e32ef0ede6a8743d627ec204c87277781940fec2ef95186c76a472b1d1f897dcdb950d6f414681b810b5109f00aab2cca52ac62aee2c2fd45854f98b0277f69b4b139d3d6ceef5b2ca3226a19c3fc9f2191cc9c5462540019f15b0f23b8548621f541d282ee189863f5f5c13eed5fe8e8c8efc9", 0x96, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="3641807c65f5cc5c3af77744aa08de5b9fa54b84c256df62777ad9c9213f2140617900f08bf9ad8b6e63f11365efdcb6ff14d785f2bad0a1a090ef10404edda929bb93d034284982a25bd2da74c2d0dc48ae1526a443bdc337f53a4979f1c683dc7f9b546123f325fef2549fa757952c964beef28e6d7a0e531b7ac3cb936e3262e9d06e079f21c6b8b4d36fc54e1f43100dd992d03bf9f1e30972efe2405221c884cde6decfe0a18e2a7c2e5189281d71668337d0c31fef6518c85f2e12ebeeeffd63d5f84ef7d909c35db20c148057b04353c1b46d15cf02fa") write$cgroup_pid(r1, &(0x7f0000000300)=r6, 0x12) 04:07:13 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x11000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2593.610289][T13994] FAULT_INJECTION: forcing a failure. [ 2593.610289][T13994] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2593.628722][T13994] CPU: 0 PID: 13994 Comm: syz-executor.3 Tainted: G B 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2593.640186][T13994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2593.650079][T13994] Call Trace: [ 2593.653214][T13994] [ 2593.655993][T13994] dump_stack_lvl+0x151/0x1b7 [ 2593.660500][T13994] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2593.665881][T13994] ? is_bpf_text_address+0x1a2/0x1c0 [ 2593.671002][T13994] ? is_module_text_address+0xe1/0x140 [ 2593.676300][T13994] dump_stack+0x15/0x17 [ 2593.680279][T13994] should_fail+0x3c0/0x510 [ 2593.684532][T13994] should_fail_alloc_page+0x58/0x70 [ 2593.689660][T13994] __alloc_pages+0x1de/0x7c0 [ 2593.694095][T13994] ? __count_vm_events+0x30/0x30 [ 2593.698856][T13994] ? __stack_depot_save+0x34/0x4b0 [ 2593.704456][T13994] ? anon_vma_clone+0xa1/0x4f0 [ 2593.709031][T13994] __pmd_alloc+0xb1/0x550 [ 2593.713202][T13994] ? __kasan_slab_alloc+0xb2/0xe0 [ 2593.718054][T13994] ? kmem_cache_alloc+0x189/0x2f0 [ 2593.722928][T13994] ? anon_vma_fork+0x1b9/0x4f0 [ 2593.727609][T13994] ? dup_mmap+0x750/0xea0 [ 2593.731768][T13994] ? dup_mm+0x91/0x330 [ 2593.735760][T13994] ? copy_mm+0x108/0x1b0 [ 2593.739841][T13994] ? kernel_clone+0x22d/0x990 [ 2593.744351][T13994] ? __pud_alloc+0x260/0x260 [ 2593.748785][T13994] copy_page_range+0xd04/0x1090 [ 2593.753468][T13994] ? pfn_valid+0x1e0/0x1e0 [ 2593.757722][T13994] dup_mmap+0x99f/0xea0 [ 2593.761714][T13994] ? __delayed_free_task+0x20/0x20 [ 2593.766664][T13994] ? mm_init+0x807/0x960 [ 2593.770740][T13994] dup_mm+0x91/0x330 [ 2593.774477][T13994] copy_mm+0x108/0x1b0 [ 2593.778377][T13994] copy_process+0x1295/0x3250 [ 2593.782969][T13994] ? proc_fail_nth_write+0x213/0x290 [ 2593.789338][T13994] ? proc_fail_nth_read+0x220/0x220 [ 2593.794368][T13994] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2593.799313][T13994] ? vfs_write+0x9af/0x1050 [ 2593.803654][T13994] ? vmacache_update+0xb7/0x120 [ 2593.808341][T13994] kernel_clone+0x22d/0x990 [ 2593.812902][T13994] ? file_end_write+0x1b0/0x1b0 [ 2593.817567][T13994] ? __kasan_check_write+0x14/0x20 [ 2593.822525][T13994] ? create_io_thread+0x1e0/0x1e0 [ 2593.827377][T13994] ? __mutex_lock_slowpath+0x10/0x10 [ 2593.832507][T13994] __x64_sys_clone+0x289/0x310 [ 2593.837117][T13994] ? __do_sys_vfork+0x130/0x130 [ 2593.841876][T13994] ? debug_smp_processor_id+0x17/0x20 [ 2593.847080][T13994] do_syscall_64+0x44/0xd0 [ 2593.851331][T13994] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2593.857174][T13994] RIP: 0033:0x7fd2e6d030d9 [ 2593.861400][T13994] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2593.880847][T13994] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2593.889205][T13994] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2593.897009][T13994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2593.904821][T13994] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2593.912627][T13994] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2593.921231][T13994] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2593.929055][T13994] 04:07:14 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) 04:07:14 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb01000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair(0x2b, 0x5, 0x7, &(0x7f0000000080)) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 04:07:14 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x20000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:14 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/ipc\x00') 04:07:14 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb02000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:14 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r0 = gettid() (rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/ipc\x00') 04:07:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)={'nicvf0\x00'}) 04:07:14 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x50}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:14 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x40000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:14 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb03000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)={'nicvf0\x00'}) [ 2594.289325][T14039] FAULT_INJECTION: forcing a failure. [ 2594.289325][T14039] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.312612][T14039] CPU: 1 PID: 14039 Comm: syz-executor.3 Tainted: G B 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2594.324164][T14039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2594.334197][T14039] Call Trace: [ 2594.337321][T14039] [ 2594.340176][T14039] dump_stack_lvl+0x151/0x1b7 [ 2594.344782][T14039] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2594.350078][T14039] dump_stack+0x15/0x17 [ 2594.354067][T14039] should_fail+0x3c0/0x510 [ 2594.358324][T14039] __should_failslab+0x9f/0xe0 [ 2594.363008][T14039] should_failslab+0x9/0x20 [ 2594.367357][T14039] kmem_cache_alloc+0x4f/0x2f0 [ 2594.372121][T14039] ? anon_vma_clone+0xa1/0x4f0 [ 2594.377006][T14039] anon_vma_clone+0xa1/0x4f0 [ 2594.381447][T14039] anon_vma_fork+0x91/0x4f0 [ 2594.385772][T14039] ? anon_vma_name+0x4c/0x70 [ 2594.390197][T14039] dup_mmap+0x750/0xea0 [ 2594.394203][T14039] ? __delayed_free_task+0x20/0x20 [ 2594.399140][T14039] ? mm_init+0x807/0x960 [ 2594.403224][T14039] dup_mm+0x91/0x330 [ 2594.406956][T14039] copy_mm+0x108/0x1b0 [ 2594.410865][T14039] copy_process+0x1295/0x3250 [ 2594.415630][T14039] ? proc_fail_nth_write+0x213/0x290 [ 2594.420751][T14039] ? proc_fail_nth_read+0x220/0x220 [ 2594.425782][T14039] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2594.430731][T14039] ? vfs_write+0x9af/0x1050 [ 2594.436204][T14039] ? vmacache_update+0xb7/0x120 [ 2594.440895][T14039] kernel_clone+0x22d/0x990 [ 2594.445228][T14039] ? file_end_write+0x1b0/0x1b0 [ 2594.449918][T14039] ? __kasan_check_write+0x14/0x20 [ 2594.454857][T14039] ? create_io_thread+0x1e0/0x1e0 [ 2594.459726][T14039] ? __mutex_lock_slowpath+0x10/0x10 [ 2594.464840][T14039] __x64_sys_clone+0x289/0x310 [ 2594.469450][T14039] ? __do_sys_vfork+0x130/0x130 [ 2594.474176][T14039] ? debug_smp_processor_id+0x17/0x20 [ 2594.479345][T14039] do_syscall_64+0x44/0xd0 [ 2594.483603][T14039] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2594.489320][T14039] RIP: 0033:0x7fd2e6d030d9 [ 2594.493570][T14039] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2594.513009][T14039] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2594.521355][T14039] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2594.529155][T14039] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 04:07:14 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 82) 04:07:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)={'nicvf0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)={'nicvf0\x00'}) (async) 04:07:14 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb04000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:14 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:14 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb05000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000000)={0x6, 0x9, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000020000000000000000100000185200000a000000000000000000007d7614ab00caa6300001000000180000000600000000000000feffffff95000000000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) [ 2594.537423][T14039] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2594.545224][T14039] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2594.553169][T14039] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2594.560999][T14039] [ 2594.602985][T14067] FAULT_INJECTION: forcing a failure. [ 2594.602985][T14067] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.638218][T14067] CPU: 0 PID: 14067 Comm: syz-executor.3 Tainted: G B 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2594.649709][T14067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2594.659594][T14067] Call Trace: [ 2594.662727][T14067] [ 2594.665483][T14067] dump_stack_lvl+0x151/0x1b7 [ 2594.670029][T14067] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2594.675566][T14067] ? do_syscall_64+0x44/0xd0 [ 2594.679978][T14067] dump_stack+0x15/0x17 [ 2594.683974][T14067] should_fail+0x3c0/0x510 [ 2594.688227][T14067] __should_failslab+0x9f/0xe0 [ 2594.692824][T14067] should_failslab+0x9/0x20 [ 2594.697163][T14067] kmem_cache_alloc+0x4f/0x2f0 [ 2594.701768][T14067] ? anon_vma_clone+0xa1/0x4f0 [ 2594.706374][T14067] anon_vma_clone+0xa1/0x4f0 [ 2594.710794][T14067] anon_vma_fork+0x91/0x4f0 [ 2594.715136][T14067] ? anon_vma_name+0x4c/0x70 [ 2594.719559][T14067] dup_mmap+0x750/0xea0 [ 2594.723638][T14067] ? __delayed_free_task+0x20/0x20 [ 2594.728594][T14067] ? mm_init+0x807/0x960 [ 2594.732659][T14067] dup_mm+0x91/0x330 [ 2594.736663][T14067] copy_mm+0x108/0x1b0 [ 2594.740645][T14067] copy_process+0x1295/0x3250 [ 2594.745249][T14067] ? proc_fail_nth_write+0x213/0x290 [ 2594.750365][T14067] ? proc_fail_nth_read+0x220/0x220 [ 2594.755399][T14067] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2594.760346][T14067] ? vfs_write+0x9af/0x1050 [ 2594.764776][T14067] ? vmacache_update+0xb7/0x120 [ 2594.769526][T14067] kernel_clone+0x22d/0x990 [ 2594.773984][T14067] ? file_end_write+0x1b0/0x1b0 [ 2594.778664][T14067] ? __kasan_check_write+0x14/0x20 [ 2594.783621][T14067] ? create_io_thread+0x1e0/0x1e0 [ 2594.788561][T14067] ? __mutex_lock_slowpath+0x10/0x10 [ 2594.793683][T14067] __x64_sys_clone+0x289/0x310 [ 2594.798287][T14067] ? __do_sys_vfork+0x130/0x130 04:07:15 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/ipc\x00') 04:07:15 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000000)={0x6, 0x9, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000020000000000000000100000185200000a000000000000000000007d7614ab00caa6300001000000180000000600000000000000feffffff95000000000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) 04:07:15 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x399}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2594.802961][T14067] ? debug_smp_processor_id+0x17/0x20 [ 2594.808171][T14067] do_syscall_64+0x44/0xd0 [ 2594.812430][T14067] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2594.818159][T14067] RIP: 0033:0x7fd2e6d030d9 [ 2594.822412][T14067] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2594.841844][T14067] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 04:07:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000000)={0x6, 0x9, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000020000000000000000100000185200000a000000000000000000007d7614ab00caa6300001000000180000000600000000000000feffffff95000000000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) 04:07:15 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x20, 0x7, 0x7, 0x7, 0x0, 0x5, 0x74804, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9df, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x5686, 0x100, 0x5, 0x4, 0x8, 0x9, 0x3, 0x0, 0x101, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x8) 04:07:15 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 83) 04:07:15 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x59020000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=ANY=[@ANYBLOB="95000087b3200a00"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:15 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc01000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:15 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x20, 0x7, 0x7, 0x7, 0x0, 0x5, 0x74804, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9df, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x5686, 0x100, 0x5, 0x4, 0x8, 0x9, 0x3, 0x0, 0x101, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x8) [ 2594.850086][T14067] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2594.857907][T14067] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2594.865712][T14067] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2594.873528][T14067] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2594.881342][T14067] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2594.889498][T14067] 04:07:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=ANY=[@ANYBLOB="95000087b3200a00"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=ANY=[@ANYBLOB="95000087b3200a00"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2594.929642][T14132] FAULT_INJECTION: forcing a failure. [ 2594.929642][T14132] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.956829][T14132] CPU: 0 PID: 14132 Comm: syz-executor.3 Tainted: G B 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2594.968564][T14132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2594.978458][T14132] Call Trace: [ 2594.981585][T14132] [ 2594.984365][T14132] dump_stack_lvl+0x151/0x1b7 [ 2594.988884][T14132] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2594.994177][T14132] dump_stack+0x15/0x17 [ 2594.998163][T14132] should_fail+0x3c0/0x510 [ 2595.002412][T14132] __should_failslab+0x9f/0xe0 [ 2595.007010][T14132] should_failslab+0x9/0x20 [ 2595.011635][T14132] kmem_cache_alloc+0x4f/0x2f0 [ 2595.016231][T14132] ? vm_area_dup+0x26/0x1d0 [ 2595.020571][T14132] ? __kasan_check_read+0x11/0x20 [ 2595.025430][T14132] vm_area_dup+0x26/0x1d0 [ 2595.029601][T14132] dup_mmap+0x6b8/0xea0 [ 2595.033604][T14132] ? __delayed_free_task+0x20/0x20 [ 2595.038541][T14132] ? mm_init+0x807/0x960 [ 2595.042634][T14132] dup_mm+0x91/0x330 [ 2595.046346][T14132] copy_mm+0x108/0x1b0 [ 2595.050252][T14132] copy_process+0x1295/0x3250 [ 2595.054763][T14132] ? proc_fail_nth_write+0x213/0x290 [ 2595.059882][T14132] ? proc_fail_nth_read+0x220/0x220 [ 2595.064918][T14132] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2595.069875][T14132] ? vfs_write+0x9af/0x1050 [ 2595.074289][T14132] ? vmacache_update+0xb7/0x120 [ 2595.078976][T14132] kernel_clone+0x22d/0x990 [ 2595.083314][T14132] ? file_end_write+0x1b0/0x1b0 [ 2595.088003][T14132] ? __kasan_check_write+0x14/0x20 [ 2595.092948][T14132] ? create_io_thread+0x1e0/0x1e0 [ 2595.097810][T14132] ? __mutex_lock_slowpath+0x10/0x10 [ 2595.102940][T14132] __x64_sys_clone+0x289/0x310 [ 2595.107618][T14132] ? __do_sys_vfork+0x130/0x130 [ 2595.112394][T14132] ? debug_smp_processor_id+0x17/0x20 [ 2595.117607][T14132] do_syscall_64+0x44/0xd0 [ 2595.121861][T14132] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2595.127579][T14132] RIP: 0033:0x7fd2e6d030d9 [ 2595.131927][T14132] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2595.151622][T14132] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2595.159872][T14132] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2595.167685][T14132] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 04:07:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f0000000000)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:15 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc02000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2595.175491][T14132] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2595.183302][T14132] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2595.191111][T14132] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2595.198926][T14132] 04:07:15 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x3cc}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:15 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x71000000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:15 executing program 1: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x20, 0x7, 0x7, 0x7, 0x0, 0x5, 0x74804, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9df, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x5686, 0x100, 0x5, 0x4, 0x8, 0x9, 0x3, 0x0, 0x101, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x8) 04:07:15 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc03000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f0000000000)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:15 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 84) 04:07:15 executing program 1: syz_clone(0x898880, 0x0, 0xfffffffffffffc9f, 0x0, 0x0, 0x0) [ 2595.274803][T14157] FAULT_INJECTION: forcing a failure. [ 2595.274803][T14157] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.288206][T14157] CPU: 0 PID: 14157 Comm: syz-executor.3 Tainted: G B 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2595.299765][T14157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2595.309662][T14157] Call Trace: [ 2595.312785][T14157] [ 2595.315562][T14157] dump_stack_lvl+0x151/0x1b7 [ 2595.320078][T14157] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2595.325371][T14157] dump_stack+0x15/0x17 [ 2595.329357][T14157] should_fail+0x3c0/0x510 [ 2595.334572][T14157] __should_failslab+0x9f/0xe0 [ 2595.339169][T14157] should_failslab+0x9/0x20 [ 2595.343507][T14157] kmem_cache_alloc+0x4f/0x2f0 [ 2595.348108][T14157] ? vm_area_dup+0x26/0x1d0 [ 2595.352446][T14157] vm_area_dup+0x26/0x1d0 [ 2595.356613][T14157] dup_mmap+0x6b8/0xea0 [ 2595.360608][T14157] ? __delayed_free_task+0x20/0x20 [ 2595.365555][T14157] ? mm_init+0x807/0x960 [ 2595.369636][T14157] dup_mm+0x91/0x330 04:07:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f0000000000)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2595.373379][T14157] copy_mm+0x108/0x1b0 [ 2595.377286][T14157] copy_process+0x1295/0x3250 [ 2595.381785][T14157] ? proc_fail_nth_write+0x213/0x290 [ 2595.386902][T14157] ? proc_fail_nth_read+0x220/0x220 [ 2595.391937][T14157] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2595.396883][T14157] ? vfs_write+0x9af/0x1050 [ 2595.401233][T14157] ? vmacache_update+0xb7/0x120 [ 2595.405910][T14157] kernel_clone+0x22d/0x990 [ 2595.410250][T14157] ? file_end_write+0x1b0/0x1b0 [ 2595.415036][T14157] ? __kasan_check_write+0x14/0x20 [ 2595.420242][T14157] ? create_io_thread+0x1e0/0x1e0 [ 2595.425183][T14157] ? __mutex_lock_slowpath+0x10/0x10 [ 2595.430590][T14157] __x64_sys_clone+0x289/0x310 [ 2595.435176][T14157] ? __do_sys_vfork+0x130/0x130 [ 2595.439871][T14157] ? debug_smp_processor_id+0x17/0x20 [ 2595.445169][T14157] do_syscall_64+0x44/0xd0 [ 2595.449415][T14157] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2595.455160][T14157] RIP: 0033:0x7fd2e6d030d9 [ 2595.459390][T14157] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2595.478834][T14157] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2595.487250][T14157] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2595.495069][T14157] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2595.502893][T14157] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2595.510682][T14157] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 04:07:15 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc04000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:15 executing program 1: syz_clone(0x898880, 0x0, 0xfffffffffffffc9f, 0x0, 0x0, 0x0) 04:07:15 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x500}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x73, 0x73, 0x7, [@datasec={0xd, 0x3, 0x0, 0xf, 0x3, [{0x1, 0xff, 0x3}, {0x5, 0x80, 0x9}, {0x5, 0x3f, 0xf2}], "9708d2"}, @volatile={0x7, 0x0, 0x0, 0x9, 0x4}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x7d, 0x0, 0x20, 0x4}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}]}, {0x0, [0x1e, 0x30, 0x5f, 0x61, 0x0]}}, &(0x7f0000000140)=""/245, 0x93, 0xf5}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=ANY=[@ANYBLOB="6785e321c7bd53ae"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:15 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc05000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2595.518501][T14157] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2595.526310][T14157] 04:07:15 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x7d020000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x73, 0x73, 0x7, [@datasec={0xd, 0x3, 0x0, 0xf, 0x3, [{0x1, 0xff, 0x3}, {0x5, 0x80, 0x9}, {0x5, 0x3f, 0xf2}], "9708d2"}, @volatile={0x7, 0x0, 0x0, 0x9, 0x4}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x7d, 0x0, 0x20, 0x4}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}]}, {0x0, [0x1e, 0x30, 0x5f, 0x61, 0x0]}}, &(0x7f0000000140)=""/245, 0x93, 0xf5}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=ANY=[@ANYBLOB="6785e321c7bd53ae"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:15 executing program 1: syz_clone(0x898880, 0x0, 0xfffffffffffffc9f, 0x0, 0x0, 0x0) 04:07:15 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 85) 04:07:15 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd01000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2595.597809][T14177] FAULT_INJECTION: forcing a failure. [ 2595.597809][T14177] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.626903][T14177] CPU: 1 PID: 14177 Comm: syz-executor.3 Tainted: G B 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2595.638386][T14177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2595.648278][T14177] Call Trace: [ 2595.651404][T14177] [ 2595.654185][T14177] dump_stack_lvl+0x151/0x1b7 [ 2595.658689][T14177] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2595.664083][T14177] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2595.670489][T14177] dump_stack+0x15/0x17 [ 2595.674492][T14177] should_fail+0x3c0/0x510 [ 2595.678735][T14177] __should_failslab+0x9f/0xe0 [ 2595.683419][T14177] should_failslab+0x9/0x20 [ 2595.687763][T14177] kmem_cache_alloc+0x4f/0x2f0 [ 2595.692364][T14177] ? anon_vma_fork+0xf7/0x4f0 [ 2595.696871][T14177] anon_vma_fork+0xf7/0x4f0 [ 2595.701228][T14177] ? anon_vma_name+0x4c/0x70 [ 2595.705640][T14177] dup_mmap+0x750/0xea0 [ 2595.709634][T14177] ? __delayed_free_task+0x20/0x20 [ 2595.714700][T14177] ? mm_init+0x807/0x960 [ 2595.718746][T14177] dup_mm+0x91/0x330 [ 2595.722480][T14177] copy_mm+0x108/0x1b0 [ 2595.726388][T14177] copy_process+0x1295/0x3250 [ 2595.731215][T14177] ? proc_fail_nth_write+0x213/0x290 [ 2595.736356][T14177] ? proc_fail_nth_read+0x220/0x220 [ 2595.741491][T14177] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2595.746440][T14177] ? vfs_write+0x9af/0x1050 [ 2595.750744][T14177] ? vmacache_update+0xb7/0x120 [ 2595.755434][T14177] kernel_clone+0x22d/0x990 [ 2595.759821][T14177] ? file_end_write+0x1b0/0x1b0 [ 2595.764461][T14177] ? __kasan_check_write+0x14/0x20 [ 2595.769398][T14177] ? create_io_thread+0x1e0/0x1e0 [ 2595.774253][T14177] ? __mutex_lock_slowpath+0x10/0x10 [ 2595.779375][T14177] __x64_sys_clone+0x289/0x310 [ 2595.783977][T14177] ? __do_sys_vfork+0x130/0x130 [ 2595.788678][T14177] ? debug_smp_processor_id+0x17/0x20 [ 2595.793917][T14177] do_syscall_64+0x44/0xd0 [ 2595.798127][T14177] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2595.803944][T14177] RIP: 0033:0x7fd2e6d030d9 [ 2595.808192][T14177] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2595.827642][T14177] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2595.835885][T14177] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 04:07:15 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd02000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) r3 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) r4 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r3, 0x0, 0x32, &(0x7f0000000080)='@%\a\x00\x00\x00C\x96i U K\xfb\xc3\xc5N\x1c\x04\xb1\x91\x93\tG\x8a\x148i\x8e%a\xa7\xf8Z\xc2NI\x1c\xdd\xc8,NYxb\x99\x94@:\x00'}, 0x30) 04:07:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x73, 0x73, 0x7, [@datasec={0xd, 0x3, 0x0, 0xf, 0x3, [{0x1, 0xff, 0x3}, {0x5, 0x80, 0x9}, {0x5, 0x3f, 0xf2}], "9708d2"}, @volatile={0x7, 0x0, 0x0, 0x9, 0x4}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x7d, 0x0, 0x20, 0x4}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}]}, {0x0, [0x1e, 0x30, 0x5f, 0x61, 0x0]}}, &(0x7f0000000140)=""/245, 0x93, 0xf5}, 0x20) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=ANY=[@ANYBLOB="6785e321c7bd53ae"], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xc5030000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) [ 2595.843687][T14177] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2595.851505][T14177] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2595.859320][T14177] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2595.867209][T14177] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2595.875025][T14177] 04:07:16 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x700}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd03000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0xb, [@func={0x9, 0x0, 0x0, 0xc, 0x4}, @volatile={0x6}, @ptr={0x4, 0x0, 0x0, 0x2, 0x2}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}, @ptr={0x8}, @fwd={0x9}, @const={0x4, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x61, 0x5f, 0x5f, 0x30, 0x5f, 0x2e, 0x0, 0x61, 0x5f]}}, &(0x7f0000000700)=""/120, 0x77, 0x78}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xb, 0x1, 0x2, 0x80000000, 0x506, 0x1, 0x3ff, '\x00', 0x0, r1, 0x3, 0x4, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r0, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c40)={0x6, 0x6, &(0x7f0000000840)=@raw=[@generic={0x7, 0x9, 0x4, 0xe16d, 0x8}, @cb_func={0x18, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xe}], &(0x7f0000000880)='syzkaller\x00', 0x6e1a0b3a, 0x1000, &(0x7f00000008c0)=""/4096, 0x41100, 0x1e, '\x00', r2, 0x25, r1, 0x8, &(0x7f0000001bc0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001cc0)={0x6, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @exit, @exit]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0xfffffe48, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', r3, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x800, 0x2000, 0x8, 0x1}, 0x10}, 0x9c) 04:07:16 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) r3 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) r4 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r3, 0x0, 0x32, &(0x7f0000000080)='@%\a\x00\x00\x00C\x96i U K\xfb\xc3\xc5N\x1c\x04\xb1\x91\x93\tG\x8a\x148i\x8e%a\xa7\xf8Z\xc2NI\x1c\xdd\xc8,NYxb\x99\x94@:\x00'}, 0x30) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) gettid() (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r3, 0x0, 0x32, &(0x7f0000000080)='@%\a\x00\x00\x00C\x96i U K\xfb\xc3\xc5N\x1c\x04\xb1\x91\x93\tG\x8a\x148i\x8e%a\xa7\xf8Z\xc2NI\x1c\xdd\xc8,NYxb\x99\x94@:\x00'}, 0x30) (async) 04:07:16 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 86) 04:07:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xcc030000, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd04000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd05000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0xb, [@func={0x9, 0x0, 0x0, 0xc, 0x4}, @volatile={0x6}, @ptr={0x4, 0x0, 0x0, 0x2, 0x2}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}, @ptr={0x8}, @fwd={0x9}, @const={0x4, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x61, 0x5f, 0x5f, 0x30, 0x5f, 0x2e, 0x0, 0x61, 0x5f]}}, &(0x7f0000000700)=""/120, 0x77, 0x78}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xb, 0x1, 0x2, 0x80000000, 0x506, 0x1, 0x3ff, '\x00', 0x0, r1, 0x3, 0x4, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r0, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c40)={0x6, 0x6, &(0x7f0000000840)=@raw=[@generic={0x7, 0x9, 0x4, 0xe16d, 0x8}, @cb_func={0x18, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xe}], &(0x7f0000000880)='syzkaller\x00', 0x6e1a0b3a, 0x1000, &(0x7f00000008c0)=""/4096, 0x41100, 0x1e, '\x00', r2, 0x25, r1, 0x8, &(0x7f0000001bc0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001cc0)={0x6, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @exit, @exit]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0xfffffe48, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', r3, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x800, 0x2000, 0x8, 0x1}, 0x10}, 0x9c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0xb, [@func={0x9, 0x0, 0x0, 0xc, 0x4}, @volatile={0x6}, @ptr={0x4, 0x0, 0x0, 0x2, 0x2}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}, @ptr={0x8}, @fwd={0x9}, @const={0x4, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x61, 0x5f, 0x5f, 0x30, 0x5f, 0x2e, 0x0, 0x61, 0x5f]}}, &(0x7f0000000700)=""/120, 0x77, 0x78}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xb, 0x1, 0x2, 0x80000000, 0x506, 0x1, 0x3ff, '\x00', 0x0, r1, 0x3, 0x4, 0x3}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r0, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c40)={0x6, 0x6, &(0x7f0000000840)=@raw=[@generic={0x7, 0x9, 0x4, 0xe16d, 0x8}, @cb_func={0x18, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xe}], &(0x7f0000000880)='syzkaller\x00', 0x6e1a0b3a, 0x1000, &(0x7f00000008c0)=""/4096, 0x41100, 0x1e, '\x00', r2, 0x25, r1, 0x8, &(0x7f0000001bc0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001cc0)={0x6, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @exit, @exit]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0xfffffe48, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', r3, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x800, 0x2000, 0x8, 0x1}, 0x10}, 0x9c) (async) 04:07:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) r2 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) (async) r3 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) (async) r4 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r3, 0x0, 0x32, &(0x7f0000000080)='@%\a\x00\x00\x00C\x96i U K\xfb\xc3\xc5N\x1c\x04\xb1\x91\x93\tG\x8a\x148i\x8e%a\xa7\xf8Z\xc2NI\x1c\xdd\xc8,NYxb\x99\x94@:\x00'}, 0x30) 04:07:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe01000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2595.962743][T14204] FAULT_INJECTION: forcing a failure. [ 2595.962743][T14204] name failslab, interval 1, probability 0, space 0, times 0 [ 2596.041602][T14204] CPU: 0 PID: 14204 Comm: syz-executor.3 Tainted: G B 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2596.053080][T14204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2596.063252][T14204] Call Trace: [ 2596.066363][T14204] [ 2596.069153][T14204] dump_stack_lvl+0x151/0x1b7 [ 2596.073656][T14204] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2596.078954][T14204] dump_stack+0x15/0x17 [ 2596.082942][T14204] should_fail+0x3c0/0x510 [ 2596.087209][T14204] __should_failslab+0x9f/0xe0 [ 2596.091797][T14204] should_failslab+0x9/0x20 [ 2596.096137][T14204] kmem_cache_alloc+0x4f/0x2f0 [ 2596.100843][T14204] ? anon_vma_fork+0x1b9/0x4f0 [ 2596.105425][T14204] anon_vma_fork+0x1b9/0x4f0 [ 2596.110101][T14204] dup_mmap+0x750/0xea0 [ 2596.114097][T14204] ? __delayed_free_task+0x20/0x20 [ 2596.119042][T14204] ? mm_init+0x807/0x960 [ 2596.123206][T14204] dup_mm+0x91/0x330 [ 2596.126945][T14204] copy_mm+0x108/0x1b0 [ 2596.130845][T14204] copy_process+0x1295/0x3250 [ 2596.135445][T14204] ? proc_fail_nth_write+0x213/0x290 [ 2596.140567][T14204] ? proc_fail_nth_read+0x220/0x220 [ 2596.145599][T14204] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2596.150554][T14204] ? vfs_write+0x9af/0x1050 [ 2596.154885][T14204] ? vmacache_update+0xb7/0x120 [ 2596.159582][T14204] kernel_clone+0x22d/0x990 [ 2596.163912][T14204] ? file_end_write+0x1b0/0x1b0 [ 2596.168598][T14204] ? __kasan_check_write+0x14/0x20 [ 2596.173547][T14204] ? create_io_thread+0x1e0/0x1e0 [ 2596.178418][T14204] ? __mutex_lock_slowpath+0x10/0x10 [ 2596.183527][T14204] __x64_sys_clone+0x289/0x310 [ 2596.188134][T14204] ? __do_sys_vfork+0x130/0x130 [ 2596.192814][T14204] ? debug_smp_processor_id+0x17/0x20 [ 2596.198023][T14204] do_syscall_64+0x44/0xd0 [ 2596.202273][T14204] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2596.208261][T14204] RIP: 0033:0x7fd2e6d030d9 [ 2596.212637][T14204] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2596.233095][T14204] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2596.241338][T14204] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2596.249196][T14204] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2596.256979][T14204] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2596.265033][T14204] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2596.272843][T14204] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2596.280664][T14204] 04:07:16 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x7a2}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x9, &(0x7f0000000340)=@raw=[@cb_func, @call={0x85, 0x0, 0x0, 0x26}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3, 0xa, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0xcc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000003c0)='GPL\x00', 0x0, 0xe5, &(0x7f0000000400)=""/229, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0xb, [@func={0x9, 0x0, 0x0, 0xc, 0x4}, @volatile={0x6}, @ptr={0x4, 0x0, 0x0, 0x2, 0x2}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}, @ptr={0x8}, @fwd={0x9}, @const={0x4, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x61, 0x5f, 0x5f, 0x30, 0x5f, 0x2e, 0x0, 0x61, 0x5f]}}, &(0x7f0000000700)=""/120, 0x77, 0x78}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xb, 0x1, 0x2, 0x80000000, 0x506, 0x1, 0x3ff, '\x00', 0x0, r1, 0x3, 0x4, 0x3}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r0, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c40)={0x6, 0x6, &(0x7f0000000840)=@raw=[@generic={0x7, 0x9, 0x4, 0xe16d, 0x8}, @cb_func={0x18, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xe}], &(0x7f0000000880)='syzkaller\x00', 0x6e1a0b3a, 0x1000, &(0x7f00000008c0)=""/4096, 0x41100, 0x1e, '\x00', r2, 0x25, r1, 0x8, &(0x7f0000001bc0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000001c00)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001cc0)={0x6, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @exit, @exit]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0xfffffe48, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', r3, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0)={0x800, 0x2000, 0x8, 0x1}, 0x10}, 0x9c) 04:07:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe02000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x6, 0x23, 0x3, 0x3f, 0x0, 0x2, 0x23004, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp, 0x20, 0x4, 0x80000000, 0x5, 0x200, 0x9, 0x101, 0x0, 0x4, 0x0, 0x5}, r0, 0x2, r1, 0xb) 04:07:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x3, &(0x7f00000034c0), 0x10}, 0x80) 04:07:16 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 87) 04:07:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe03000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) (async) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x6, 0x23, 0x3, 0x3f, 0x0, 0x2, 0x23004, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp, 0x20, 0x4, 0x80000000, 0x5, 0x200, 0x9, 0x101, 0x0, 0x4, 0x0, 0x5}, r0, 0x2, r1, 0xb) 04:07:16 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x5, &(0x7f00000000c0)=@raw=[@alu={0x7, 0x1, 0x7, 0x6, 0x2, 0xfffffffffffffff8, 0x1}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0x0, 0x68488c61e35ab3c5, 0x5, 0xa, 0x20, 0x10}], &(0x7f0000000140)='GPL\x00', 0x2, 0xc, &(0x7f0000000180)=""/12, 0x1f00, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x2, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x1]}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={@cgroup=r0, 0xffffffffffffffff, 0x28, 0x2, r1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x4, 0x6ce5, 0x3, 0x1, 0x1, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) 04:07:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe04000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x5, &(0x7f00000000c0)=@raw=[@alu={0x7, 0x1, 0x7, 0x6, 0x2, 0xfffffffffffffff8, 0x1}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0x0, 0x68488c61e35ab3c5, 0x5, 0xa, 0x20, 0x10}], &(0x7f0000000140)='GPL\x00', 0x2, 0xc, &(0x7f0000000180)=""/12, 0x1f00, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x2, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x1]}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={@cgroup=r0, 0xffffffffffffffff, 0x28, 0x2, r1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x4, 0x6ce5, 0x3, 0x1, 0x1, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x5, &(0x7f00000000c0)=@raw=[@alu={0x7, 0x1, 0x7, 0x6, 0x2, 0xfffffffffffffff8, 0x1}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0x0, 0x68488c61e35ab3c5, 0x5, 0xa, 0x20, 0x10}], &(0x7f0000000140)='GPL\x00', 0x2, 0xc, &(0x7f0000000180)=""/12, 0x1f00, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x2, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x1]}, 0x80) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={@cgroup=r0, 0xffffffffffffffff, 0x28, 0x2, r1}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x4, 0x6ce5, 0x3, 0x1, 0x1, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) (async) 04:07:16 executing program 1: r0 = syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x6, 0x23, 0x3, 0x3f, 0x0, 0x2, 0x23004, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp, 0x20, 0x4, 0x80000000, 0x5, 0x200, 0x9, 0x101, 0x0, 0x4, 0x0, 0x5}, r0, 0x2, r1, 0xb) syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) (async) gettid() (async) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) (async) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x6, 0x23, 0x3, 0x3f, 0x0, 0x2, 0x23004, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp, 0x20, 0x4, 0x80000000, 0x5, 0x200, 0x9, 0x101, 0x0, 0x4, 0x0, 0x5}, r0, 0x2, r1, 0xb) (async) [ 2596.342277][T14247] FAULT_INJECTION: forcing a failure. [ 2596.342277][T14247] name failslab, interval 1, probability 0, space 0, times 0 [ 2596.394753][T14247] CPU: 0 PID: 14247 Comm: syz-executor.3 Tainted: G B 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2596.406231][T14247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2596.416226][T14247] Call Trace: [ 2596.419434][T14247] [ 2596.422214][T14247] dump_stack_lvl+0x151/0x1b7 [ 2596.426721][T14247] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2596.432028][T14247] dump_stack+0x15/0x17 [ 2596.436016][T14247] should_fail+0x3c0/0x510 [ 2596.440397][T14247] __should_failslab+0x9f/0xe0 [ 2596.444989][T14247] should_failslab+0x9/0x20 [ 2596.449330][T14247] kmem_cache_alloc+0x4f/0x2f0 [ 2596.453940][T14247] ? anon_vma_fork+0x1b9/0x4f0 [ 2596.458539][T14247] anon_vma_fork+0x1b9/0x4f0 [ 2596.462980][T14247] dup_mmap+0x750/0xea0 [ 2596.466957][T14247] ? __delayed_free_task+0x20/0x20 [ 2596.471896][T14247] ? mm_init+0x807/0x960 [ 2596.476067][T14247] dup_mm+0x91/0x330 [ 2596.479789][T14247] copy_mm+0x108/0x1b0 [ 2596.483694][T14247] copy_process+0x1295/0x3250 [ 2596.488246][T14247] ? proc_fail_nth_write+0x213/0x290 [ 2596.493327][T14247] ? proc_fail_nth_read+0x220/0x220 [ 2596.498539][T14247] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2596.503486][T14247] ? vfs_write+0x9af/0x1050 [ 2596.507924][T14247] ? vmacache_update+0xb7/0x120 [ 2596.512606][T14247] kernel_clone+0x22d/0x990 [ 2596.516932][T14247] ? file_end_write+0x1b0/0x1b0 [ 2596.521619][T14247] ? __kasan_check_write+0x14/0x20 [ 2596.526566][T14247] ? create_io_thread+0x1e0/0x1e0 [ 2596.531456][T14247] ? __mutex_lock_slowpath+0x10/0x10 [ 2596.536562][T14247] __x64_sys_clone+0x289/0x310 [ 2596.541151][T14247] ? __do_sys_vfork+0x130/0x130 [ 2596.545836][T14247] ? debug_smp_processor_id+0x17/0x20 [ 2596.551044][T14247] do_syscall_64+0x44/0xd0 [ 2596.555381][T14247] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2596.561205][T14247] RIP: 0033:0x7fd2e6d030d9 [ 2596.565464][T14247] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2596.585671][T14247] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2596.594013][T14247] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 [ 2596.601830][T14247] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2596.609625][T14247] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2596.617438][T14247] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2596.625256][T14247] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2596.633066][T14247] 04:07:16 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x2000}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x4, &(0x7f00000034c0), 0x10}, 0x80) 04:07:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe05000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x5, &(0x7f00000000c0)=@raw=[@alu={0x7, 0x1, 0x7, 0x6, 0x2, 0xfffffffffffffff8, 0x1}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0x0, 0x68488c61e35ab3c5, 0x5, 0xa, 0x20, 0x10}], &(0x7f0000000140)='GPL\x00', 0x2, 0xc, &(0x7f0000000180)=""/12, 0x1f00, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x2, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x1]}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={@cgroup=r0, 0xffffffffffffffff, 0x28, 0x2, r1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x4, 0x6ce5, 0x3, 0x1, 0x1, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x5, &(0x7f00000000c0)=@raw=[@alu={0x7, 0x1, 0x7, 0x6, 0x2, 0xfffffffffffffff8, 0x1}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0x0, 0x68488c61e35ab3c5, 0x5, 0xa, 0x20, 0x10}], &(0x7f0000000140)='GPL\x00', 0x2, 0xc, &(0x7f0000000180)=""/12, 0x1f00, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x2, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x1]}, 0x80) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={@cgroup=r0, 0xffffffffffffffff, 0x28, 0x2, r1}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x4, 0x6ce5, 0x3, 0x1, 0x1, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) (async) 04:07:16 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mlxsw_sp_acl_tcam_vregion_migrate\x00'}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x43, 0x5, 0xf7, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x3f}, 0x410, 0x1, 0xff, 0x2, 0x0, 0xafa8, 0x3ff, 0x0, 0x2, 0x0, 0x10000}, r0, 0x1, r1, 0x8) getpid() 04:07:16 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 88) 04:07:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0xa, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x2, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf01000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mlxsw_sp_acl_tcam_vregion_migrate\x00'}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x43, 0x5, 0xf7, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x3f}, 0x410, 0x1, 0xff, 0x2, 0x0, 0xafa8, 0x3ff, 0x0, 0x2, 0x0, 0x10000}, r0, 0x1, r1, 0x8) getpid() syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mlxsw_sp_acl_tcam_vregion_migrate\x00'}, 0x10) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x43, 0x5, 0xf7, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x3f}, 0x410, 0x1, 0xff, 0x2, 0x0, 0xafa8, 0x3ff, 0x0, 0x2, 0x0, 0x10000}, r0, 0x1, r1, 0x8) (async) getpid() (async) 04:07:17 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0xa, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x2, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:17 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf02000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2596.727942][T14294] FAULT_INJECTION: forcing a failure. [ 2596.727942][T14294] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2596.788775][T14294] CPU: 1 PID: 14294 Comm: syz-executor.3 Tainted: G B 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2596.800250][T14294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2596.810245][T14294] Call Trace: [ 2596.813365][T14294] [ 2596.816145][T14294] dump_stack_lvl+0x151/0x1b7 [ 2596.820661][T14294] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2596.825965][T14294] dump_stack+0x15/0x17 [ 2596.829950][T14294] should_fail+0x3c0/0x510 [ 2596.834211][T14294] should_fail_alloc_page+0x58/0x70 [ 2596.839228][T14294] __alloc_pages+0x1de/0x7c0 [ 2596.843654][T14294] ? __count_vm_events+0x30/0x30 [ 2596.848424][T14294] pte_alloc_one+0x73/0x1b0 [ 2596.852772][T14294] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2596.857806][T14294] __pte_alloc+0x86/0x350 [ 2596.861966][T14294] ? free_pgtables+0x210/0x210 [ 2596.866564][T14294] ? _raw_spin_lock+0xa3/0x1b0 [ 2596.871181][T14294] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2596.876391][T14294] ? unwind_get_return_address+0x4c/0x90 [ 2596.881852][T14294] copy_pte_range+0x1b1f/0x20b0 [ 2596.886776][T14294] ? stack_trace_save+0x12d/0x1f0 [ 2596.891669][T14294] ? anon_vma_clone+0xa1/0x4f0 [ 2596.896391][T14294] ? __kunmap_atomic+0x80/0x80 [ 2596.901317][T14294] ? dup_mmap+0x750/0xea0 [ 2596.905744][T14294] ? copy_mm+0x108/0x1b0 [ 2596.910284][T14294] ? copy_process+0x1295/0x3250 [ 2596.914942][T14294] ? kernel_clone+0x22d/0x990 [ 2596.919464][T14294] ? __x64_sys_clone+0x289/0x310 [ 2596.924234][T14294] ? do_syscall_64+0x44/0xd0 [ 2596.928827][T14294] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2596.934837][T14294] copy_page_range+0xc1e/0x1090 [ 2596.939631][T14294] ? pfn_valid+0x1e0/0x1e0 [ 2596.943862][T14294] dup_mmap+0x99f/0xea0 [ 2596.947867][T14294] ? __delayed_free_task+0x20/0x20 [ 2596.953321][T14294] ? mm_init+0x807/0x960 [ 2596.957937][T14294] dup_mm+0x91/0x330 [ 2596.961668][T14294] copy_mm+0x108/0x1b0 [ 2596.965684][T14294] copy_process+0x1295/0x3250 [ 2596.970248][T14294] ? proc_fail_nth_write+0x213/0x290 [ 2596.975362][T14294] ? proc_fail_nth_read+0x220/0x220 [ 2596.980592][T14294] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2596.985526][T14294] ? vfs_write+0x9af/0x1050 [ 2596.989955][T14294] ? vmacache_update+0xb7/0x120 [ 2596.994748][T14294] kernel_clone+0x22d/0x990 [ 2596.999146][T14294] ? file_end_write+0x1b0/0x1b0 [ 2597.003832][T14294] ? __kasan_check_write+0x14/0x20 [ 2597.008776][T14294] ? create_io_thread+0x1e0/0x1e0 [ 2597.013636][T14294] ? __mutex_lock_slowpath+0x10/0x10 [ 2597.018760][T14294] __x64_sys_clone+0x289/0x310 [ 2597.023378][T14294] ? __do_sys_vfork+0x130/0x130 [ 2597.028223][T14294] ? debug_smp_processor_id+0x17/0x20 [ 2597.033426][T14294] do_syscall_64+0x44/0xd0 [ 2597.037888][T14294] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2597.043776][T14294] RIP: 0033:0x7fd2e6d030d9 [ 2597.048133][T14294] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2597.067906][T14294] RSP: 002b:00007fd2e5a76118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2597.076321][T14294] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6d030d9 04:07:17 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x4000}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:17 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mlxsw_sp_acl_tcam_vregion_migrate\x00'}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x43, 0x5, 0xf7, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x3f}, 0x410, 0x1, 0xff, 0x2, 0x0, 0xafa8, 0x3ff, 0x0, 0x2, 0x0, 0x10000}, r0, 0x1, r1, 0x8) getpid() syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mlxsw_sp_acl_tcam_vregion_migrate\x00'}, 0x10) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x43, 0x5, 0xf7, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x3f}, 0x410, 0x1, 0xff, 0x2, 0x0, 0xafa8, 0x3ff, 0x0, 0x2, 0x0, 0x10000}, r0, 0x1, r1, 0x8) (async) getpid() (async) 04:07:17 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0xa, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x2, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0xa, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x2, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) (async) 04:07:17 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf03000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:17 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x50, &(0x7f00000034c0), 0x10}, 0x80) 04:07:17 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 89) [ 2597.084149][T14294] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001248000 [ 2597.092039][T14294] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2597.100137][T14294] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2597.108122][T14294] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2597.116018][T14294] 04:07:17 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf04000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:17 executing program 1: syz_clone(0x1800000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:17 executing program 5: ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:17 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf05000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:17 executing program 5: ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:17 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2597.235330][T14347] FAULT_INJECTION: forcing a failure. [ 2597.235330][T14347] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2597.255961][T14347] CPU: 1 PID: 14347 Comm: syz-executor.3 Tainted: G B 5.15.74-syzkaller-00001-g4ec71a9ec769 #0 [ 2597.267519][T14347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2597.277594][T14347] Call Trace: [ 2597.280907][T14347] [ 2597.283694][T14347] dump_stack_lvl+0x151/0x1b7 [ 2597.288195][T14347] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2597.293498][T14347] dump_stack+0x15/0x17 [ 2597.297489][T14347] should_fail+0x3c0/0x510 [ 2597.301741][T14347] should_fail_usercopy+0x1a/0x20 [ 2597.306608][T14347] _copy_to_user+0x20/0x90 [ 2597.310941][T14347] simple_read_from_buffer+0xdd/0x160 [ 2597.316145][T14347] proc_fail_nth_read+0x1af/0x220 [ 2597.321005][T14347] ? proc_fault_inject_write+0x3a0/0x3a0 [ 2597.326595][T14347] ? security_file_permission+0x497/0x5f0 [ 2597.332135][T14347] ? proc_fault_inject_write+0x3a0/0x3a0 [ 2597.337616][T14347] vfs_read+0x299/0xd80 [ 2597.342123][T14347] ? kernel_read+0x1f0/0x1f0 [ 2597.346547][T14347] ? __kasan_check_write+0x14/0x20 [ 2597.351489][T14347] ? mutex_lock+0xb6/0x130 [ 2597.355833][T14347] ? wait_for_completion_killable_timeout+0x10/0x10 [ 2597.362276][T14347] ? __fdget_pos+0x26d/0x310 [ 2597.366681][T14347] ? ksys_read+0x77/0x2c0 [ 2597.370844][T14347] ksys_read+0x198/0x2c0 [ 2597.375011][T14347] ? vfs_write+0x1050/0x1050 [ 2597.379619][T14347] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2597.385511][T14347] __x64_sys_read+0x7b/0x90 [ 2597.390118][T14347] do_syscall_64+0x44/0xd0 [ 2597.394376][T14347] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2597.400181][T14347] RIP: 0033:0x7fd2e6cb4efc [ 2597.404490][T14347] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2597.424138][T14347] RSP: 002b:00007fd2e5a76160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2597.432387][T14347] RAX: ffffffffffffffda RBX: 00007fd2e6e22f80 RCX: 00007fd2e6cb4efc [ 2597.440558][T14347] RDX: 000000000000000f RSI: 00007fd2e5a761e0 RDI: 0000000000000003 [ 2597.448394][T14347] RBP: 00007fd2e5a761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2597.456267][T14347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2597.464252][T14347] R13: 00007ffd11c6454f R14: 00007fd2e5a76300 R15: 0000000000022000 [ 2597.472071][T14347] 04:07:17 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0xf4240, &(0x7f0000003340)=@raw=[@exit={0x95, 0x0, 0x0, 0x5000}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:17 executing program 1: syz_clone(0x1800000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:17 executing program 5: ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:17 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1001000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:17 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x20000, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) 04:07:17 executing program 3: syz_clone(0x1248000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:17 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1002000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:07:17 executing program 1: syz_clone(0x1800000, 0x0, 0x0, 0x0, 0x0, 0x0) 04:07:17 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='blkio.reset_stats\x00', 0x2, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003680)={0x6, 0x1, &(0x7f0000003340)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x6, 0xf5, &(0x7f00000033c0)=""/245, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000034c0), 0x10}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x2, 0x1802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0xec, 0xeb, &(0x7f0000000080)=""/235, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xd, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[r2]}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r2, &(0x7f0000000040)="25feb6f046f0b0bdc921eb674b40c657433c7539ef7eb10a82fdd45823f92e31883834f5afda0ab8fd408dfe750c8eabe4a2b43fd9c6370785e03f52a9e47db4cbd669a160427880f6885cb431870b1997e8e5a76b61d91b5bdb35b5bed23ce03c128577dbfce7654454fabcd713da93e20d963c466a6a9465dd603230bbffcc6305e65df7be205b8ae6071a5bcb9207ffce9df3ce010ea40d7708",